<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
        xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
        xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
        xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
        xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2015-11-16T04:02:19</oval:timestamp>
  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20022443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-2443</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2002-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443" source="CVE"/>
    <description>
    schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082782" comment="krb5-doc-1.10.2-10.17.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082783" comment="krb5-mini-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082786" comment="krb5-mini-devel-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082787" comment="krb5-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082788" comment="krb5-32bit-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082789" comment="krb5-client-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082794" comment="krb5-devel-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082795" comment="krb5-devel-32bit-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082796" comment="krb5-plugin-kdb-ldap-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082798" comment="krb5-plugin-preauth-pkinit-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082800" comment="krb5-server-1.10.2-10.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2771</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2004-2771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771" source="CVE"/>
    <description>
    The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103200" comment="mailx-12.5-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6746</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2007-6746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746" source="CVE"/>
    <description>
    telepathy-idle before 0.1.15 does not verify (1) that the issuer is a trusted CA, (2) that the server hostname matches a domain name in the subject's Common Name (CN), or (3) the expiration date of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082195" comment="telepathy-idle-0.1.14-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5031</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2009-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5031" source="CVE"/>
    <description>
    ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089984" comment="apache2-mod_security2-2.7.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5298</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2010-5298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298" source="CVE"/>
    <description>
    Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095358" comment="libopenssl-devel-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095359" comment="libopenssl-devel-32bit-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095360" comment="libopenssl1_0_0-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095361" comment="libopenssl1_0_0-32bit-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095362" comment="openssl-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095363" comment="openssl-doc-1.0.1g-1.52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1407</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-1407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1407" source="CVE"/>
    <description>
    The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099265" comment="exim-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099266" comment="eximon-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099267" comment="eximstats-html-4.83-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
    <description>
    crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091363" comment="whois-5.0.26-12.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3368</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-3368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102728" comment="apache2-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102729" comment="apache2-devel-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102730" comment="apache2-doc-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102731" comment="apache2-event-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102732" comment="apache2-example-pages-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102733" comment="apache2-itk-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102734" comment="apache2-prefork-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102735" comment="apache2-utils-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102736" comment="apache2-worker-2.2.29-10.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4971</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2011-4971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4971" source="CVE"/>
    <description>
    Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097488" comment="memcached-1.4.20-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0862</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-0862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862" source="CVE"/>
    <description>
    builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094904" comment="xinetd-2.3.14-163.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1016</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016" source="CVE"/>
    <description>
    The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081529" comment="krb5-doc-1.10.2-10.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081530" comment="krb5-mini-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081533" comment="krb5-mini-devel-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081534" comment="krb5-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081535" comment="krb5-32bit-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081536" comment="krb5-client-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081541" comment="krb5-devel-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081542" comment="krb5-devel-32bit-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081543" comment="krb5-plugin-kdb-ldap-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081545" comment="krb5-plugin-preauth-pkinit-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081547" comment="krb5-server-1.10.2-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2687</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081839" comment="apache2-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081842" comment="apache2-devel-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081843" comment="apache2-doc-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081844" comment="apache2-event-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081846" comment="apache2-example-pages-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081847" comment="apache2-itk-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081849" comment="apache2-prefork-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081851" comment="apache2-utils-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081853" comment="apache2-worker-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102728" comment="apache2-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102729" comment="apache2-devel-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102730" comment="apache2-doc-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102731" comment="apache2-event-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102732" comment="apache2-example-pages-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102733" comment="apache2-itk-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102734" comment="apache2-prefork-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102735" comment="apache2-utils-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102736" comment="apache2-worker-2.2.29-10.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2751</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2751" source="CVE"/>
    <description>
    ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089984" comment="apache2-mod_security2-2.7.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3422</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422" source="CVE"/>
    <description>
    The getFirstInTableInstance function in the IcedTea-Web plugin before 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted web page, which causes an uninitialized memory location to be read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082204" comment="icedtea-web-1.4-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082207" comment="icedtea-web-javadoc-1.4-4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3423</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote attackers to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a crafted Java applet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082204" comment="icedtea-web-1.4-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082207" comment="icedtea-web-javadoc-1.4-4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3437</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3437" source="CVE"/>
    <description>
    The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8 and earlier does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081719" comment="ImageMagick-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081722" comment="ImageMagick-devel-32bit-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081723" comment="ImageMagick-devel-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081724" comment="ImageMagick-doc-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081725" comment="ImageMagick-extra-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081727" comment="libMagick++-devel-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081728" comment="libMagick++5-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081730" comment="libMagickCore5-32bit-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081731" comment="libMagickCore5-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081734" comment="libMagickWand5-32bit-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081735" comment="libMagickWand5-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081738" comment="perl-PerlMagick-6.7.8.8-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3438</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3438" source="CVE"/>
    <description>
    The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081740" comment="GraphicsMagick-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081743" comment="GraphicsMagick-devel-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081744" comment="libGraphicsMagick++-devel-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081745" comment="libGraphicsMagick++3-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081747" comment="libGraphicsMagick3-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081749" comment="libGraphicsMagickWand2-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081751" comment="perl-GraphicsMagick-1.3.17-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3499</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081839" comment="apache2-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081842" comment="apache2-devel-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081843" comment="apache2-doc-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081844" comment="apache2-event-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081846" comment="apache2-example-pages-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081847" comment="apache2-itk-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081849" comment="apache2-prefork-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081851" comment="apache2-utils-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081853" comment="apache2-worker-2.2.22-10.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3505</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-3505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3505" source="CVE"/>
    <description>
    Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably.  bucket.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083006" comment="tinyproxy-1.8.3-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4412</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" source="CVE"/>
    <description>
    Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090796" comment="glibc-testsuite-2.17-4.7.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090797" comment="glibc-utils-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090798" comment="glibc-utils-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090802" comment="glibc-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090803" comment="glibc-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090807" comment="glibc-devel-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090808" comment="glibc-devel-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090811" comment="glibc-devel-static-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090812" comment="glibc-devel-static-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090813" comment="glibc-extra-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090815" comment="glibc-i18ndata-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090816" comment="glibc-info-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090817" comment="glibc-locale-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090818" comment="glibc-locale-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090821" comment="glibc-obsolete-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090823" comment="glibc-profile-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090824" comment="glibc-profile-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090825" comment="nscd-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090827" comment="glibc-html-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090828" comment="glibc-testsuite-2.17-4.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4520</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4520" source="CVE"/>
    <description>
    The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080476" comment="python-django-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4528</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4528" source="CVE"/>
    <description>
    The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089984" comment="apache2-mod_security2-2.7.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4540</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540" source="CVE"/>
    <description>
    Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090829" comment="icedtea-web-1.4.1-4.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090832" comment="icedtea-web-javadoc-1.4.1-4.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4558</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081839" comment="apache2-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081842" comment="apache2-devel-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081843" comment="apache2-doc-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081844" comment="apache2-event-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081846" comment="apache2-example-pages-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081847" comment="apache2-itk-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081849" comment="apache2-prefork-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081851" comment="apache2-utils-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081853" comment="apache2-worker-2.2.22-10.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4929</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929" source="CVE"/>
    <description>
    The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091207" comment="libopenssl-devel-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091208" comment="libopenssl-devel-32bit-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091209" comment="libopenssl1_0_0-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091210" comment="libopenssl1_0_0-32bit-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091211" comment="openssl-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091212" comment="openssl-doc-1.0.1e-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5526</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5526" source="CVE"/>
    <description>
    CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081592" comment="perl-32bit-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081593" comment="perl-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081594" comment="perl-base-32bit-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081595" comment="perl-base-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081601" comment="perl-doc-5.16.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5642</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5642" source="CVE"/>
    <description>
    server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081794" comment="fail2ban-0.8.8-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5671</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5671" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099265" comment="exim-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099266" comment="eximon-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099267" comment="eximstats-html-4.83-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5783</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783" source="CVE"/>
    <description>
    Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081835" comment="jakarta-commons-httpclient-3.1-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081836" comment="jakarta-commons-httpclient-demo-3.1-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081837" comment="jakarta-commons-httpclient-javadoc-3.1-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081838" comment="jakarta-commons-httpclient-manual-3.1-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6075</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075" source="CVE"/>
    <description>
    Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6085</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085" source="CVE"/>
    <description>
    The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082354" comment="gpg2-2.0.19-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082357" comment="gpg2-lang-2.0.19-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6121</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6121" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 0.8.5 allows remote attackers to inject arbitrary web script or HTML via a (1) data:text or (2) vbscript link.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090385" comment="roundcubemail-0.9.3-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6128</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6128" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082198" comment="openconnect-4.08-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082201" comment="openconnect-devel-4.08-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082202" comment="openconnect-doc-4.08-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082203" comment="openconnect-lang-4.08-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6139</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139" source="CVE"/>
    <description>
    libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081795" comment="libxslt-python-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081798" comment="libxslt-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081800" comment="libxslt-devel-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081801" comment="libxslt-devel-32bit-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081802" comment="libxslt-tools-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081804" comment="libxslt1-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081805" comment="libxslt1-32bit-1.1.28-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6150</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" source="CVE"/>
    <description>
    The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094251" comment="samba-doc-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094252" comment="libnetapi-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094253" comment="libnetapi0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094254" comment="libsmbclient-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094255" comment="libsmbclient0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094256" comment="libsmbclient0-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094257" comment="libsmbsharemodes-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094258" comment="libsmbsharemodes0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094259" comment="libwbclient-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094260" comment="libwbclient0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094261" comment="libwbclient0-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094262" comment="samba-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094263" comment="samba-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094264" comment="samba-client-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094265" comment="samba-client-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094266" comment="samba-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094267" comment="samba-krb-printing-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094268" comment="samba-winbind-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094269" comment="samba-winbind-32bit-3.6.12-59.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6152</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152" source="CVE"/>
    <description>
    The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6329</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2012-6329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6329" source="CVE"/>
    <description>
    The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081592" comment="perl-32bit-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081593" comment="perl-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081594" comment="perl-base-32bit-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081595" comment="perl-base-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081601" comment="perl-doc-5.16.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0151</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0151" source="CVE"/>
    <description>
    The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings and host OS crash) by leveraging administrative access to an HVM guest in a domain with a large number of VCPUs.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0155</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0155" source="CVE"/>
    <description>
    Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092082" comment="rubygem-actionpack-3_2-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092083" comment="rubygem-actionpack-3_2-doc-3.2.12-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0179</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0179" source="CVE"/>
    <description>
    The process_bin_delete function in memcached.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097488" comment="memcached-1.4.20-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0208</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0208" source="CVE"/>
    <description>
    The boot-from-volume feature in OpenStack Compute (Nova) Folsom and Essex, when using nova-volumes, allows remote authenticated users to boot from other users' volumes via a volume id in the block_device_mapping parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0212</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0212" source="CVE"/>
    <description>
    store/swift.py in OpenStack Glance Essex (2012.1), Folsom (2012.2) before 2012.2.3, and Grizzly, when in Swift single tenant mode, logs the Swift endpoint's user name and password in cleartext when the endpoint is misconfigured or unusable, allows remote authenticated users to obtain sensitive information by reading the error messages.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0242</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" source="CVE"/>
    <description>
    Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090796" comment="glibc-testsuite-2.17-4.7.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090797" comment="glibc-utils-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090798" comment="glibc-utils-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090802" comment="glibc-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090803" comment="glibc-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090807" comment="glibc-devel-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090808" comment="glibc-devel-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090811" comment="glibc-devel-static-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090812" comment="glibc-devel-static-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090813" comment="glibc-extra-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090815" comment="glibc-i18ndata-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090816" comment="glibc-info-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090817" comment="glibc-locale-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090818" comment="glibc-locale-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090821" comment="glibc-obsolete-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090823" comment="glibc-profile-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090824" comment="glibc-profile-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090825" comment="nscd-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090827" comment="glibc-html-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090828" comment="glibc-testsuite-2.17-4.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0247</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0247" source="CVE"/>
    <description>
    OpenStack Keystone Essex 2012.1.3 and earlier, Folsom 2012.2.3 and earlier, and Grizzly grizzly-2 and earlier allows remote attackers to cause a denial of service (disk consumption) via many invalid token requests that trigger excessive generation of log entries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0252</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0252" source="CVE"/>
    <description>
    boost::locale::utf::utf_traits in the Boost.Locale library in Boost 1.48 through 1.52 does not properly detect certain invalid UTF-8 sequences, which might allow remote attackers to bypass input validation protection mechanisms via crafted trailing bytes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090880" comment="boost-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090881" comment="boost-devel-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090882" comment="boost-devel-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090883" comment="boost-doc-html-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090884" comment="boost-doc-man-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090885" comment="boost-doc-pdf-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090886" comment="boost-license1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090887" comment="libboost_chrono1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090888" comment="libboost_date_time1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090889" comment="libboost_date_time1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090890" comment="libboost_filesystem1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090891" comment="libboost_filesystem1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090892" comment="libboost_graph1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090893" comment="libboost_graph1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090894" comment="libboost_iostreams1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090895" comment="libboost_iostreams1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090896" comment="libboost_locale1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090897" comment="libboost_math1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090898" comment="libboost_math1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090899" comment="libboost_mpi1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090900" comment="libboost_mpi1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090901" comment="libboost_program_options1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090902" comment="libboost_program_options1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090903" comment="libboost_python1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090904" comment="libboost_python1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090905" comment="libboost_random1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090906" comment="libboost_random1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090907" comment="libboost_regex1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090908" comment="libboost_regex1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090909" comment="libboost_serialization1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090910" comment="libboost_serialization1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090911" comment="libboost_signals1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090912" comment="libboost_signals1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090913" comment="libboost_system1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090914" comment="libboost_system1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090915" comment="libboost_test1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090916" comment="libboost_test1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090917" comment="libboost_thread1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090918" comment="libboost_thread1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090919" comment="libboost_timer1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090920" comment="libboost_wave1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090921" comment="libboost_wave1_49_0-32bit-1.49.0-12.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0269</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269" source="CVE"/>
    <description>
    The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081784" comment="ruby-1.9.3-15.2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081785" comment="ruby-devel-1.9.3-15.2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081786" comment="ruby19-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081789" comment="ruby19-devel-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081790" comment="ruby19-devel-extra-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081791" comment="ruby19-doc-ri-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081792" comment="ruby19-tk-1.9.3.p392-1.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0271</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271" source="CVE"/>
    <description>
    The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081602" comment="finch-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081604" comment="finch-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081605" comment="libpurple-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081606" comment="libpurple-branding-upstream-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081608" comment="libpurple-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081609" comment="libpurple-lang-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081610" comment="libpurple-meanwhile-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081612" comment="libpurple-tcl-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081614" comment="pidgin-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081617" comment="pidgin-devel-2.10.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0272</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272" source="CVE"/>
    <description>
    Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081602" comment="finch-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081604" comment="finch-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081605" comment="libpurple-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081606" comment="libpurple-branding-upstream-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081608" comment="libpurple-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081609" comment="libpurple-lang-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081610" comment="libpurple-meanwhile-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081612" comment="libpurple-tcl-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081614" comment="pidgin-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081617" comment="pidgin-devel-2.10.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0273</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273" source="CVE"/>
    <description>
    sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081602" comment="finch-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081604" comment="finch-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081605" comment="libpurple-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081606" comment="libpurple-branding-upstream-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081608" comment="libpurple-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081609" comment="libpurple-lang-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081610" comment="libpurple-meanwhile-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081612" comment="libpurple-tcl-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081614" comment="pidgin-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081617" comment="pidgin-devel-2.10.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0274</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274" source="CVE"/>
    <description>
    upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081602" comment="finch-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081604" comment="finch-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081605" comment="libpurple-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081606" comment="libpurple-branding-upstream-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081608" comment="libpurple-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081609" comment="libpurple-lang-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081610" comment="libpurple-meanwhile-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081612" comment="libpurple-tcl-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081614" comment="pidgin-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081617" comment="pidgin-devel-2.10.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0282</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0282" source="CVE"/>
    <description>
    OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0287</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0287" source="CVE"/>
    <description>
    The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081756" comment="libipa_hbac-devel-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081757" comment="libipa_hbac0-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081759" comment="libsss_idmap-devel-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081760" comment="libsss_idmap0-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081762" comment="libsss_sudo-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081764" comment="python-ipa_hbac-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081766" comment="python-sssd-config-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081768" comment="sssd-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081769" comment="sssd-32bit-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081773" comment="sssd-ipa-provider-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081775" comment="sssd-tools-1.9.4-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0288</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0288" source="CVE"/>
    <description>
    nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081682" comment="nss-pam-ldapd-0.8.10-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081683" comment="nss-pam-ldapd-32bit-0.8.10-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0290</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0290" source="CVE"/>
    <description>
    The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel before 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082295" comment="kernel-debug-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082296" comment="kernel-debug-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082300" comment="kernel-debug-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082302" comment="kernel-default-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082303" comment="kernel-default-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082307" comment="kernel-default-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082309" comment="kernel-desktop-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082310" comment="kernel-desktop-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082314" comment="kernel-desktop-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082316" comment="kernel-docs-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082317" comment="kernel-ec2-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082318" comment="kernel-ec2-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082322" comment="kernel-ec2-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082324" comment="kernel-pae-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082325" comment="kernel-pae-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082329" comment="kernel-pae-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082331" comment="kernel-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082332" comment="kernel-source-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082333" comment="kernel-source-vanilla-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082334" comment="kernel-syms-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082335" comment="kernel-trace-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082336" comment="kernel-trace-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082340" comment="kernel-trace-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082342" comment="kernel-vanilla-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082345" comment="kernel-vanilla-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082347" comment="kernel-xen-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082348" comment="kernel-xen-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082352" comment="kernel-xen-devel-3.7.10-1.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0296</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0296" source="CVE"/>
    <description>
    Race condition in pigz before 2.2.5 uses permissions derived from the umask when compressing a file before setting that file's permissions to match those of the original file, which might allow local users to bypass intended access permissions while compression is occurring.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081753" comment="pigz-2.2.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0305</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0305" source="CVE"/>
    <description>
    The administrative interface for Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 does not check permissions for the history view, which allows remote authenticated administrators to obtain sensitive object history information.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080476" comment="python-django-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0306</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0306" source="CVE"/>
    <description>
    The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080476" comment="python-django-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0335</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0335" source="CVE"/>
    <description>
    OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to gain access to a VM in opportunistic circumstances by using the VNC token for a deleted VM that was bound to the same VNC port.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0338</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338" source="CVE"/>
    <description>
    libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081701" comment="libxml2-2-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081702" comment="libxml2-2-32bit-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081705" comment="libxml2-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081707" comment="libxml2-devel-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081708" comment="libxml2-devel-32bit-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081709" comment="libxml2-doc-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081710" comment="libxml2-tools-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081712" comment="python-libxml2-2.9.0-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0343</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343" source="CVE"/>
    <description>
    The ipv6_create_tempaddr function in net/ipv6/addrconf.c in the Linux kernel through 3.8 does not properly handle problems with the generation of IPv6 temporary addresses, which allows remote attackers to cause a denial of service (excessive retries and address-generation outage), and consequently obtain sensitive information, via ICMPv6 Router Advertisement (RA) messages.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0348</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0348" source="CVE"/>
    <description>
    thttpd.c in sthttpd before 2.26.4-r2 and thttpd 2.25b use world-readable permissions for /var/log/thttpd.log, which allows local users to obtain sensitive information by reading the file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091910" comment="thttpd-2.25b-195.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0401</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401" source="CVE"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0454</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454" source="CVE"/>
    <description>
    The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or "hide unreadable" parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082224" comment="samba-doc-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082225" comment="ldapsmb-1.34b-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082226" comment="libnetapi-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082227" comment="libnetapi0-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082229" comment="libsmbclient-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082230" comment="libsmbclient0-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082231" comment="libsmbclient0-32bit-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082234" comment="libsmbsharemodes-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082235" comment="libsmbsharemodes0-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082237" comment="libwbclient-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082238" comment="libwbclient0-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082239" comment="libwbclient0-32bit-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082242" comment="samba-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082243" comment="samba-32bit-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082244" comment="samba-client-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082245" comment="samba-client-32bit-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082251" comment="samba-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082252" comment="samba-krb-printing-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082254" comment="samba-winbind-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082255" comment="samba-winbind-32bit-3.6.12-59.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0787</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081521" comment="MozillaFirefox-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081522" comment="MozillaFirefox-branding-upstream-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081523" comment="MozillaFirefox-buildsymbols-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081526" comment="MozillaFirefox-devel-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081527" comment="MozillaFirefox-translations-common-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081528" comment="MozillaFirefox-translations-other-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081549" comment="mozilla-js-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081550" comment="mozilla-js-32bit-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081553" comment="xulrunner-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081554" comment="xulrunner-32bit-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081555" comment="xulrunner-buildsymbols-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081559" comment="xulrunner-devel-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081584" comment="seamonkey-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081587" comment="seamonkey-dom-inspector-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081588" comment="seamonkey-irc-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081589" comment="seamonkey-translations-common-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081590" comment="seamonkey-translations-other-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081591" comment="seamonkey-venkman-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081669" comment="MozillaThunderbird-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081670" comment="MozillaThunderbird-buildsymbols-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081673" comment="MozillaThunderbird-devel-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081675" comment="MozillaThunderbird-translations-common-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081676" comment="MozillaThunderbird-translations-other-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081677" comment="enigmail-1.5.1+17.0.4-61.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0788</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081963" comment="seamonkey-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081966" comment="seamonkey-dom-inspector-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081967" comment="seamonkey-irc-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081968" comment="seamonkey-translations-common-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081969" comment="seamonkey-translations-other-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081970" comment="seamonkey-venkman-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0789</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081963" comment="seamonkey-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081966" comment="seamonkey-dom-inspector-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081967" comment="seamonkey-irc-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081968" comment="seamonkey-translations-common-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081969" comment="seamonkey-translations-other-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081970" comment="seamonkey-venkman-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0791</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791" source="CVE"/>
    <description>
    The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0792</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081963" comment="seamonkey-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081966" comment="seamonkey-dom-inspector-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081967" comment="seamonkey-irc-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081968" comment="seamonkey-translations-common-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081969" comment="seamonkey-translations-other-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081970" comment="seamonkey-venkman-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0793</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081963" comment="seamonkey-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081966" comment="seamonkey-dom-inspector-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081967" comment="seamonkey-irc-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081968" comment="seamonkey-translations-common-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081969" comment="seamonkey-translations-other-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081970" comment="seamonkey-venkman-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0794</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17 do not prevent origin spoofing of tab-modal dialogs, which allows remote attackers to conduct phishing attacks via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081963" comment="seamonkey-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081966" comment="seamonkey-dom-inspector-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081967" comment="seamonkey-irc-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081968" comment="seamonkey-translations-common-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081969" comment="seamonkey-translations-other-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081970" comment="seamonkey-venkman-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0795</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081963" comment="seamonkey-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081966" comment="seamonkey-dom-inspector-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081967" comment="seamonkey-irc-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081968" comment="seamonkey-translations-common-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081969" comment="seamonkey-translations-other-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081970" comment="seamonkey-venkman-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0796</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796" source="CVE"/>
    <description>
    The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081963" comment="seamonkey-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081966" comment="seamonkey-dom-inspector-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081967" comment="seamonkey-irc-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081968" comment="seamonkey-translations-common-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081969" comment="seamonkey-translations-other-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081970" comment="seamonkey-venkman-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0800</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800" source="CVE"/>
    <description>
    Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081963" comment="seamonkey-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081966" comment="seamonkey-dom-inspector-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081967" comment="seamonkey-irc-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081968" comment="seamonkey-translations-common-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081969" comment="seamonkey-translations-other-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081970" comment="seamonkey-venkman-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0801</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0809</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081687" comment="java-1_7_0-openjdk-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081690" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081692" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081694" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081695" comment="java-1_7_0-openjdk-src-1.7.0.6-8.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0913</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913" source="CVE"/>
    <description>
    Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082073" comment="kernel-debug-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082074" comment="kernel-debug-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082078" comment="kernel-debug-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082080" comment="kernel-default-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082081" comment="kernel-default-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082085" comment="kernel-default-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082087" comment="kernel-desktop-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082088" comment="kernel-desktop-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082092" comment="kernel-desktop-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082094" comment="kernel-docs-3.7.10-1.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082095" comment="kernel-ec2-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082096" comment="kernel-ec2-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082100" comment="kernel-ec2-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082102" comment="kernel-pae-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082103" comment="kernel-pae-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082107" comment="kernel-pae-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082109" comment="kernel-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082110" comment="kernel-source-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082111" comment="kernel-source-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082112" comment="kernel-syms-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082113" comment="kernel-trace-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082114" comment="kernel-trace-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082118" comment="kernel-trace-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082120" comment="kernel-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082123" comment="kernel-vanilla-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082125" comment="kernel-xen-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082126" comment="kernel-xen-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082130" comment="kernel-xen-devel-3.7.10-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0914</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-0914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0914" source="CVE"/>
    <description>
    The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1059</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1059" source="CVE"/>
    <description>
    net/ceph/auth_none.c in the Linux kernel through 3.10 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an auth_reply message that triggers an attempted build_request operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1090</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1090" source="CVE"/>
    <description>
    The SUSE horde5 package before 5.0.2-2.4.1 sets incorrect ownership for certain configuration files and directories including /etc/apache2/vhosts.d, which allows local wwwrun users to gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091757" comment="horde5-5.0.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1415</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415" source="CVE"/>
    <description>
    The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081529" comment="krb5-doc-1.10.2-10.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081530" comment="krb5-mini-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081533" comment="krb5-mini-devel-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081534" comment="krb5-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081535" comment="krb5-32bit-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081536" comment="krb5-client-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081541" comment="krb5-devel-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081542" comment="krb5-devel-32bit-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081543" comment="krb5-plugin-kdb-ldap-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081545" comment="krb5-plugin-preauth-pkinit-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081547" comment="krb5-server-1.10.2-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1416</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416" source="CVE"/>
    <description>
    The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082146" comment="krb5-doc-1.10.2-10.13.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082147" comment="krb5-mini-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082150" comment="krb5-mini-devel-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082151" comment="krb5-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082152" comment="krb5-32bit-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082153" comment="krb5-client-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082158" comment="krb5-devel-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082159" comment="krb5-devel-32bit-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082160" comment="krb5-plugin-kdb-ldap-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082162" comment="krb5-plugin-preauth-pkinit-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082164" comment="krb5-server-1.10.2-10.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1418</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418" source="CVE"/>
    <description>
    The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091522" comment="krb5-doc-1.10.2-10.22.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091523" comment="krb5-mini-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091524" comment="krb5-mini-devel-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091525" comment="krb5-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091526" comment="krb5-32bit-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091527" comment="krb5-client-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091528" comment="krb5-devel-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091529" comment="krb5-devel-32bit-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091530" comment="krb5-plugin-kdb-ldap-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091531" comment="krb5-plugin-preauth-pkinit-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091532" comment="krb5-server-1.10.2-10.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1431</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1431" source="CVE"/>
    <description>
    The Wocky module in Telepathy Gabble before 0.16.6 and 0.17.x before 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows remote attackers to bypass TLS verification and perform a man-in-the-middle attacks.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082519" comment="telepathy-gabble-0.17.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082522" comment="telepathy-gabble-xmpp-console-0.17.1-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1432</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" source="CVE"/>
    <description>
    Xen 4.1.x and 4.2.x, when the XSA-45 patch is in place, does not properly maintain references on pages stored for deferred cleanup, which allows local PV guest kernels to cause a denial of service (premature page free and hypervisor crash) or possible gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1434</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1434" source="CVE"/>
    <description>
    Multiple SQL injection vulnerabilities in (1) api_poller.php and (2) utility.php in Cacti before 0.8.8b allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090306" comment="cacti-0.8.8b-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1435</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1435" source="CVE"/>
    <description>
    (1) snmp.php and (2) rrd.php in Cacti before 0.8.8b allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090306" comment="cacti-0.8.8b-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1442</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" source="CVE"/>
    <description>
    Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1443</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1443" source="CVE"/>
    <description>
    The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090759" comment="python-django-1.4.8-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1488</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1488" source="CVE"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1493</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493" source="CVE"/>
    <description>
    The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081687" comment="java-1_7_0-openjdk-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081690" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081692" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081694" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081695" comment="java-1_7_0-openjdk-src-1.7.0.6-8.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1500</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1518</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1518" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1537</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1557</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1569</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1571</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571" source="CVE"/>
    <description>
    Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1620</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620" source="CVE"/>
    <description>
    The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1635</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635" source="CVE"/>
    <description>
    ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083036" comment="apache2-mod_php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083038" comment="php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083039" comment="php5-bcmath-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083041" comment="php5-bz2-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083043" comment="php5-calendar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083045" comment="php5-ctype-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083047" comment="php5-curl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083049" comment="php5-dba-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083053" comment="php5-devel-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083054" comment="php5-dom-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083056" comment="php5-enchant-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083058" comment="php5-exif-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083060" comment="php5-fastcgi-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083062" comment="php5-fileinfo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083064" comment="php5-fpm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083066" comment="php5-ftp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083068" comment="php5-gd-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083070" comment="php5-gettext-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083072" comment="php5-gmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083074" comment="php5-iconv-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083076" comment="php5-imap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083078" comment="php5-intl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083080" comment="php5-json-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083082" comment="php5-ldap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083084" comment="php5-mbstring-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083086" comment="php5-mcrypt-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083088" comment="php5-mssql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083090" comment="php5-mysql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083092" comment="php5-odbc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083094" comment="php5-openssl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083096" comment="php5-pcntl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083098" comment="php5-pdo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083100" comment="php5-pear-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083101" comment="php5-pgsql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083103" comment="php5-phar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083105" comment="php5-posix-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083107" comment="php5-pspell-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083109" comment="php5-readline-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083111" comment="php5-shmop-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083113" comment="php5-snmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083115" comment="php5-soap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083117" comment="php5-sockets-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083119" comment="php5-sqlite-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083121" comment="php5-suhosin-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083123" comment="php5-sysvmsg-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083125" comment="php5-sysvsem-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083127" comment="php5-sysvshm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083129" comment="php5-tidy-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083131" comment="php5-tokenizer-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083133" comment="php5-wddx-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083135" comment="php5-xmlreader-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083137" comment="php5-xmlrpc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083139" comment="php5-xmlwriter-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083141" comment="php5-xsl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083143" comment="php5-zip-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083145" comment="php5-zlib-5.3.17-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1640</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1640" source="CVE"/>
    <description>
    The (1) template and (2) inline_template functions in the master server in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users to execute arbitrary code via a crafted catalog request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1643</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643" source="CVE"/>
    <description>
    The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083036" comment="apache2-mod_php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083038" comment="php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083039" comment="php5-bcmath-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083041" comment="php5-bz2-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083043" comment="php5-calendar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083045" comment="php5-ctype-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083047" comment="php5-curl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083049" comment="php5-dba-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083053" comment="php5-devel-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083054" comment="php5-dom-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083056" comment="php5-enchant-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083058" comment="php5-exif-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083060" comment="php5-fastcgi-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083062" comment="php5-fileinfo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083064" comment="php5-fpm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083066" comment="php5-ftp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083068" comment="php5-gd-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083070" comment="php5-gettext-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083072" comment="php5-gmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083074" comment="php5-iconv-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083076" comment="php5-imap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083078" comment="php5-intl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083080" comment="php5-json-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083082" comment="php5-ldap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083084" comment="php5-mbstring-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083086" comment="php5-mcrypt-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083088" comment="php5-mssql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083090" comment="php5-mysql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083092" comment="php5-odbc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083094" comment="php5-openssl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083096" comment="php5-pcntl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083098" comment="php5-pdo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083100" comment="php5-pear-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083101" comment="php5-pgsql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083103" comment="php5-phar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083105" comment="php5-posix-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083107" comment="php5-pspell-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083109" comment="php5-readline-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083111" comment="php5-shmop-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083113" comment="php5-snmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083115" comment="php5-soap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083117" comment="php5-sockets-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083119" comment="php5-sqlite-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083121" comment="php5-suhosin-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083123" comment="php5-sysvmsg-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083125" comment="php5-sysvsem-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083127" comment="php5-sysvshm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083129" comment="php5-tidy-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083131" comment="php5-tokenizer-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083133" comment="php5-wddx-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083135" comment="php5-xmlreader-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083137" comment="php5-xmlrpc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083139" comment="php5-xmlwriter-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083141" comment="php5-xsl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083143" comment="php5-zip-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083145" comment="php5-zlib-5.3.17-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1652</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1652" source="CVE"/>
    <description>
    Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users with a valid certificate and private key to read arbitrary catalogs or poison the master's cache via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1653</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1653" source="CVE"/>
    <description>
    Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote authenticated users to execute arbitrary code via a crafted HTTP request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1654</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1654" source="CVE"/>
    <description>
    Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL protocol between client and master, which allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessions via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1655</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1655" source="CVE"/>
    <description>
    Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1664</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664" source="CVE"/>
    <description>
    The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1665</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665" source="CVE"/>
    <description>
    The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex and Folsom, Django, and possibly other products allow remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080476" comment="python-django-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1667</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667" source="CVE"/>
    <description>
    The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081592" comment="perl-32bit-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081593" comment="perl-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081594" comment="perl-base-32bit-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081595" comment="perl-base-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081601" comment="perl-doc-5.16.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1669</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1670</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1671</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671" source="CVE"/>
    <description>
    Mozilla Firefox before 21.0 does not properly implement the INPUT element, which allows remote attackers to obtain the full pathname via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1674</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code via vectors involving an onresize event during the playing of a video.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1675</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675" source="CVE"/>
    <description>
    Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1676</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676" source="CVE"/>
    <description>
    The SelectionIterator::GetNextSegment function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1677</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677" source="CVE"/>
    <description>
    The gfxSkipCharsIterator::SetOffsets function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1678</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678" source="CVE"/>
    <description>
    The _cairo_xlib_surface_add_glyph function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1679</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::plugins::child::_geturlnotify function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1680</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1681</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::RemoveScriptBlocker function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1682</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1683</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1683" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1684</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1685</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1686</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1687</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1688</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1688" source="CVE"/>
    <description>
    The Profiler implementation in Mozilla Firefox before 22.0 parses untrusted data during UI rendering, which allows user-assisted remote attackers to execute arbitrary JavaScript code via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1690</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1692</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1693</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693" source="CVE"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1694</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694" source="CVE"/>
    <description>
    The PreserveWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly handle the lack of a wrapper, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by leveraging unintended clearing of the wrapper cache's preserved-wrapper flag.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1695</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1695" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0 does not properly implement certain DocShell inheritance behavior for the sandbox attribute of an IFRAME element, which allows remote attackers to bypass intended access restrictions via a FRAME element within an IFRAME element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1696</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1696" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0 does not properly enforce the X-Frame-Options protection mechanism, which allows remote attackers to conduct clickjacking attacks via a crafted web site that uses the HTTP server push feature with multipart responses.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1697</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1698</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1698" source="CVE"/>
    <description>
    The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1699</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1699" source="CVE"/>
    <description>
    The Internationalized Domain Name (IDN) display algorithm in Mozilla Firefox before 22.0 does not properly handle the .com, .name, and .net top-level domains, which allows remote attackers to spoof the address bar via unspecified homograph characters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1701</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1702</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1702" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1704</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1704" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1705</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705" source="CVE"/>
    <description>
    Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1708</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1708" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1709</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1710</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710" source="CVE"/>
    <description>
    The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1711</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1711" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 does not properly address the possibility of an XBL scope bypass resulting from non-native arguments in XBL function calls, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging access to an unprivileged object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1713</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1714</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714" source="CVE"/>
    <description>
    The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1717</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1718</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1719</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1719" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1720</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720" source="CVE"/>
    <description>
    The nsHtml5TreeBuilder::resetTheInsertionMode function in the HTML5 Tree Builder in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 does not properly maintain the state of the insertion-mode stack for template elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer over-read) by triggering use of this stack in its empty state.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1721</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721" source="CVE"/>
    <description>
    Integer overflow in the drawLineLoop function in the libGLESv2 library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 24.0 and SeaMonkey before 2.21, allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1722</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1723</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723" source="CVE"/>
    <description>
    The NativeKey widget in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 processes key messages after destruction by a dispatched event listener, which allows remote attackers to cause a denial of service (application crash) by leveraging incorrect event usage after widget-memory reallocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1724</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1725</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not ensure that initialization occurs for JavaScript objects with compartments, which allows remote attackers to execute arbitrary code by leveraging incorrect scope handling.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1728</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728" source="CVE"/>
    <description>
    The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1730</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1732</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" source="CVE"/>
    <description>
    Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1735</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1736</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1737</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1738</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738" source="CVE"/>
    <description>
    Use-after-free vulnerability in the JS_GetGlobalForScopeChain function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code by leveraging incorrect garbage collection in situations involving default compartments and frame-chain restoration.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1739</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090988" comment="libfreebl3-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090989" comment="libfreebl3-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090990" comment="libsoftokn3-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090991" comment="libsoftokn3-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090992" comment="mozilla-nss-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090993" comment="mozilla-nss-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090994" comment="mozilla-nss-certs-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090995" comment="mozilla-nss-certs-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090996" comment="mozilla-nss-devel-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090997" comment="mozilla-nss-sysinit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090998" comment="mozilla-nss-sysinit-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090999" comment="mozilla-nss-tools-3.15.2-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1764</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1764" source="CVE"/>
    <description>
    The Zypper (aka zypp) backend in PackageKit before 0.8.8 allows local users to downgrade packages via the "install updates" method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081561" comment="PackageKit-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081562" comment="PackageKit-backend-zypp-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081564" comment="PackageKit-branding-upstream-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081565" comment="PackageKit-browser-plugin-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081569" comment="PackageKit-devel-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081571" comment="PackageKit-gstreamer-plugin-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081573" comment="PackageKit-gtk3-module-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081575" comment="PackageKit-lang-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081576" comment="libpackagekit-glib2-16-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081577" comment="libpackagekit-glib2-16-32bit-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081580" comment="libpackagekit-glib2-devel-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081581" comment="libpackagekit-glib2-devel-32bit-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081582" comment="typelib-1_0-PackageKitGlib-1_0-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081583" comment="typelib-1_0-PackageKitPlugin-1_0-0.8.7-4.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1769</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1769" source="CVE"/>
    <description>
    A certain hashing algorithm in Telepathy Gabble 0.16.x before 0.16.5 and 0.17.x before 0.17.3 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081696" comment="telepathy-gabble-0.17.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081699" comment="telepathy-gabble-xmpp-console-0.17.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1775</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775" source="CVE"/>
    <description>
    sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081493" comment="sudo-1.8.6p3-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081496" comment="sudo-devel-1.8.6p3-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
    <description>
    sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081493" comment="sudo-1.8.6p3-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081496" comment="sudo-devel-1.8.6p3-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1792</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1792" source="CVE"/>
    <description>
    Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel before 3.8.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1796</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796" source="CVE"/>
    <description>
    The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082073" comment="kernel-debug-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082074" comment="kernel-debug-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082078" comment="kernel-debug-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082080" comment="kernel-default-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082081" comment="kernel-default-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082085" comment="kernel-default-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082087" comment="kernel-desktop-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082088" comment="kernel-desktop-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082092" comment="kernel-desktop-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082094" comment="kernel-docs-3.7.10-1.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082095" comment="kernel-ec2-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082096" comment="kernel-ec2-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082100" comment="kernel-ec2-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082102" comment="kernel-pae-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082103" comment="kernel-pae-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082107" comment="kernel-pae-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082109" comment="kernel-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082110" comment="kernel-source-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082111" comment="kernel-source-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082112" comment="kernel-syms-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082113" comment="kernel-trace-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082114" comment="kernel-trace-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082118" comment="kernel-trace-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082120" comment="kernel-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082123" comment="kernel-vanilla-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082125" comment="kernel-xen-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082126" comment="kernel-xen-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082130" comment="kernel-xen-devel-3.7.10-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1797</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797" source="CVE"/>
    <description>
    Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082073" comment="kernel-debug-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082074" comment="kernel-debug-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082078" comment="kernel-debug-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082080" comment="kernel-default-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082081" comment="kernel-default-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082085" comment="kernel-default-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082087" comment="kernel-desktop-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082088" comment="kernel-desktop-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082092" comment="kernel-desktop-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082094" comment="kernel-docs-3.7.10-1.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082095" comment="kernel-ec2-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082096" comment="kernel-ec2-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082100" comment="kernel-ec2-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082102" comment="kernel-pae-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082103" comment="kernel-pae-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082107" comment="kernel-pae-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082109" comment="kernel-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082110" comment="kernel-source-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082111" comment="kernel-source-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082112" comment="kernel-syms-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082113" comment="kernel-trace-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082114" comment="kernel-trace-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082118" comment="kernel-trace-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082120" comment="kernel-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082123" comment="kernel-vanilla-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082125" comment="kernel-xen-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082126" comment="kernel-xen-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082130" comment="kernel-xen-devel-3.7.10-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1798</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798" source="CVE"/>
    <description>
    The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082073" comment="kernel-debug-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082074" comment="kernel-debug-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082078" comment="kernel-debug-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082080" comment="kernel-default-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082081" comment="kernel-default-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082085" comment="kernel-default-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082087" comment="kernel-desktop-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082088" comment="kernel-desktop-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082092" comment="kernel-desktop-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082094" comment="kernel-docs-3.7.10-1.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082095" comment="kernel-ec2-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082096" comment="kernel-ec2-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082100" comment="kernel-ec2-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082102" comment="kernel-pae-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082103" comment="kernel-pae-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082107" comment="kernel-pae-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082109" comment="kernel-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082110" comment="kernel-source-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082111" comment="kernel-source-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082112" comment="kernel-syms-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082113" comment="kernel-trace-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082114" comment="kernel-trace-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082118" comment="kernel-trace-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082120" comment="kernel-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082123" comment="kernel-vanilla-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082125" comment="kernel-xen-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082126" comment="kernel-xen-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082130" comment="kernel-xen-devel-3.7.10-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1819</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1819" source="CVE"/>
    <description>
    The _xfs_buf_find function in fs/xfs/xfs_buf.c in the Linux kernel before 3.7.6 does not validate block numbers, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the ability to mount an XFS filesystem containing a metadata inode with an invalid extent map.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1821</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821" source="CVE"/>
    <description>
    lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081784" comment="ruby-1.9.3-15.2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081785" comment="ruby-devel-1.9.3-15.2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081786" comment="ruby19-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081789" comment="ruby19-devel-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081790" comment="ruby19-devel-extra-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081791" comment="ruby19-doc-ri-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081792" comment="ruby19-tk-1.9.3.p392-1.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1838</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1838" source="CVE"/>
    <description>
    OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) does not properly implement a quota for fixed IPs, which allows remote authenticated users to cause a denial of service (resource exhaustion and failure to spawn new instances) via a large number of calls to the addFixedIp function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1840</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1840" source="CVE"/>
    <description>
    The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1842</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1842" source="CVE"/>
    <description>
    SQL injection vulnerability in the Extbase Framework in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, related to "the Query Object Model and relation values."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081679" comment="typo3-cms-4_5-4.5.25-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081680" comment="typo3-cms-4_6-4.6.18-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081681" comment="typo3-cms-4_7-4.7.10-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1843</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1843" source="CVE"/>
    <description>
    Open redirect vulnerability in the Access tracking mechanism in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081679" comment="typo3-cms-4_5-4.5.25-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081680" comment="typo3-cms-4_6-4.6.18-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081681" comment="typo3-cms-4_7-4.7.10-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1845</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1845" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081946" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081948" comment="libsvn_auth_kwallet-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081950" comment="subversion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081951" comment="subversion-bash-completion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081954" comment="subversion-devel-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081955" comment="subversion-perl-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081957" comment="subversion-python-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081959" comment="subversion-server-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081961" comment="subversion-tools-1.7.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1846</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1846" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081946" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081948" comment="libsvn_auth_kwallet-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081950" comment="subversion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081951" comment="subversion-bash-completion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081954" comment="subversion-devel-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081955" comment="subversion-perl-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081957" comment="subversion-python-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081959" comment="subversion-server-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081961" comment="subversion-tools-1.7.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1847</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1847" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081946" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081948" comment="libsvn_auth_kwallet-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081950" comment="subversion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081951" comment="subversion-bash-completion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081954" comment="subversion-devel-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081955" comment="subversion-perl-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081957" comment="subversion-python-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081959" comment="subversion-server-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081961" comment="subversion-tools-1.7.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1848</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1848" source="CVE"/>
    <description>
    fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082073" comment="kernel-debug-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082074" comment="kernel-debug-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082078" comment="kernel-debug-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082080" comment="kernel-default-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082081" comment="kernel-default-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082085" comment="kernel-default-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082087" comment="kernel-desktop-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082088" comment="kernel-desktop-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082092" comment="kernel-desktop-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082094" comment="kernel-docs-3.7.10-1.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082095" comment="kernel-ec2-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082096" comment="kernel-ec2-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082100" comment="kernel-ec2-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082102" comment="kernel-pae-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082103" comment="kernel-pae-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082107" comment="kernel-pae-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082109" comment="kernel-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082110" comment="kernel-source-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082111" comment="kernel-source-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082112" comment="kernel-syms-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082113" comment="kernel-trace-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082114" comment="kernel-trace-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082118" comment="kernel-trace-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082120" comment="kernel-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082123" comment="kernel-vanilla-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082125" comment="kernel-xen-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082126" comment="kernel-xen-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082130" comment="kernel-xen-devel-3.7.10-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1849</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1849" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081946" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081948" comment="libsvn_auth_kwallet-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081950" comment="subversion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081951" comment="subversion-bash-completion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081954" comment="subversion-devel-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081955" comment="subversion-perl-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081957" comment="subversion-python-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081959" comment="subversion-server-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081961" comment="subversion-tools-1.7.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1853</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1853" source="CVE"/>
    <description>
    Almanah Diary 0.9.0 and 0.10.0 does not encrypt the database when closed, which allows local users to obtain sensitive information by reading the database.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081715" comment="almanah-0.10.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081718" comment="almanah-lang-0.10.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1854</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1854" source="CVE"/>
    <description>
    The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081918" comment="rubygem-activerecord-3_2-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081919" comment="rubygem-activerecord-3_2-doc-3.2.12-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1855</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1855" source="CVE"/>
    <description>
    The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081916" comment="rubygem-actionpack-3_2-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081917" comment="rubygem-actionpack-3_2-doc-3.2.12-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1857</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1857" source="CVE"/>
    <description>
    The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a &amp;#x3a; sequence.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081916" comment="rubygem-actionpack-3_2-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081917" comment="rubygem-actionpack-3_2-doc-3.2.12-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1862</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862" source="CVE"/>
    <description>
    mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089965" comment="apache2-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089968" comment="apache2-devel-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089969" comment="apache2-doc-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089970" comment="apache2-event-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089972" comment="apache2-example-pages-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089973" comment="apache2-itk-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089975" comment="apache2-prefork-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089977" comment="apache2-utils-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089979" comment="apache2-worker-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102728" comment="apache2-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102729" comment="apache2-devel-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102730" comment="apache2-doc-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102731" comment="apache2-event-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102732" comment="apache2-example-pages-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102733" comment="apache2-itk-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102734" comment="apache2-prefork-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102735" comment="apache2-utils-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102736" comment="apache2-worker-2.2.29-10.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1865</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1865" source="CVE"/>
    <description>
    OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081780" comment="openstack-keystone-doc-2012.2.4+git.1363796849.255b1d4-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081781" comment="openstack-keystone-2012.2.4+git.1363796849.255b1d4-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081782" comment="openstack-keystone-test-2012.2.4+git.1363796849.255b1d4-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081783" comment="python-keystone-2012.2.4+git.1363796849.255b1d4-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1872</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1872" source="CVE"/>
    <description>
    The Intel drivers in Mesa 8.0.x and 9.0.x allow context-dependent attackers to cause a denial of service (reachable assertion and crash) and possibly execute arbitrary code via vectors involving 3d graphics that trigger an out-of-bounds array access, related to the fs_visitor::remove_dead_constants function.  NOTE: this issue might be related to CVE-2013-0796.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082906" comment="Mesa-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082907" comment="Mesa-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082911" comment="Mesa-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082912" comment="Mesa-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082913" comment="Mesa-libEGL-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082914" comment="Mesa-libEGL-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082915" comment="Mesa-libEGL1-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082916" comment="Mesa-libEGL1-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082919" comment="Mesa-libGL-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082920" comment="Mesa-libGL-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082921" comment="Mesa-libGL1-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082922" comment="Mesa-libGL1-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082925" comment="Mesa-libGLESv1_CM-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082926" comment="Mesa-libGLESv1_CM-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082927" comment="Mesa-libGLESv1_CM1-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082928" comment="Mesa-libGLESv1_CM1-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082931" comment="Mesa-libGLESv2-2-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082932" comment="Mesa-libGLESv2-2-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082935" comment="Mesa-libGLESv2-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082936" comment="Mesa-libGLESv2-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082937" comment="Mesa-libIndirectGL-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082938" comment="Mesa-libIndirectGL-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082939" comment="Mesa-libIndirectGL1-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082940" comment="Mesa-libIndirectGL1-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082943" comment="Mesa-libglapi-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082944" comment="Mesa-libglapi-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082945" comment="Mesa-libglapi0-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082946" comment="Mesa-libglapi0-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082949" comment="libOSMesa-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082950" comment="libOSMesa-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082951" comment="libOSMesa9-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082952" comment="libOSMesa9-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082955" comment="libXvMC_nouveau-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082956" comment="libXvMC_nouveau-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082959" comment="libXvMC_r300-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082960" comment="libXvMC_r300-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082963" comment="libXvMC_r600-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082964" comment="libXvMC_r600-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082967" comment="libXvMC_softpipe-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082968" comment="libXvMC_softpipe-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082971" comment="libgbm-devel-0.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082972" comment="libgbm-devel-32bit-0.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082973" comment="libgbm1-0.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082974" comment="libgbm1-32bit-0.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082977" comment="libvdpau_nouveau-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082978" comment="libvdpau_nouveau-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082981" comment="libvdpau_r300-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082982" comment="libvdpau_r300-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082985" comment="libvdpau_r600-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082986" comment="libvdpau_r600-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082989" comment="libvdpau_softpipe-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082990" comment="libvdpau_softpipe-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082993" comment="libxatracker-devel-1.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082994" comment="libxatracker1-1.0.0-34.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1881</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1881" source="CVE"/>
    <description>
    GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092047" comment="gtk3-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092048" comment="gtk3-branding-upstream-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092049" comment="gtk3-data-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092050" comment="gtk3-devel-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092051" comment="gtk3-devel-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092052" comment="gtk3-immodule-amharic-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092053" comment="gtk3-immodule-amharic-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092054" comment="gtk3-immodule-inuktitut-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092055" comment="gtk3-immodule-inuktitut-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092056" comment="gtk3-immodule-multipress-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092057" comment="gtk3-immodule-multipress-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092058" comment="gtk3-immodule-thai-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092059" comment="gtk3-immodule-thai-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092060" comment="gtk3-immodule-vietnamese-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092061" comment="gtk3-immodule-vietnamese-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092062" comment="gtk3-immodule-xim-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092063" comment="gtk3-immodule-xim-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092064" comment="gtk3-immodules-tigrigna-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092065" comment="gtk3-immodules-tigrigna-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092066" comment="gtk3-lang-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092067" comment="gtk3-tools-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092068" comment="gtk3-tools-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092069" comment="libgtk-3-0-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092070" comment="libgtk-3-0-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092071" comment="typelib-1_0-Gtk-3_0-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092072" comment="gdk-pixbuf-loader-rsvg-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092073" comment="gdk-pixbuf-loader-rsvg-32bit-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092074" comment="gtk2-engine-svg-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092075" comment="gtk2-engine-svg-32bit-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092076" comment="librsvg-2-2-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092077" comment="librsvg-2-2-32bit-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092078" comment="librsvg-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092079" comment="librsvg-devel-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092080" comment="rsvg-view-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092081" comment="typelib-1_0-Rsvg-2_0-2.36.4-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1884</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1884" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081946" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081948" comment="libsvn_auth_kwallet-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081950" comment="subversion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081951" comment="subversion-bash-completion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081954" comment="subversion-devel-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081955" comment="subversion-perl-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081957" comment="subversion-python-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081959" comment="subversion-server-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081961" comment="subversion-tools-1.7.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1896</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896" source="CVE"/>
    <description>
    mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089965" comment="apache2-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089968" comment="apache2-devel-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089969" comment="apache2-doc-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089970" comment="apache2-event-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089972" comment="apache2-example-pages-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089973" comment="apache2-itk-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089975" comment="apache2-prefork-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089977" comment="apache2-utils-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089979" comment="apache2-worker-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102728" comment="apache2-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102729" comment="apache2-devel-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102730" comment="apache2-doc-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102731" comment="apache2-event-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102732" comment="apache2-example-pages-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102733" comment="apache2-itk-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102734" comment="apache2-prefork-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102735" comment="apache2-utils-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102736" comment="apache2-worker-2.2.29-10.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1899</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899" source="CVE"/>
    <description>
    Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081920" comment="libecpg6-32bit-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081921" comment="libecpg6-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081924" comment="libpq5-32bit-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081925" comment="libpq5-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081928" comment="postgresql92-devel-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081930" comment="postgresql92-libs-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081932" comment="postgresql92-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081933" comment="postgresql92-contrib-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081937" comment="postgresql92-docs-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081938" comment="postgresql92-plperl-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081940" comment="postgresql92-plpython-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081942" comment="postgresql92-pltcl-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081944" comment="postgresql92-server-9.2.4-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1900</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081920" comment="libecpg6-32bit-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081921" comment="libecpg6-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081924" comment="libpq5-32bit-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081925" comment="libpq5-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081928" comment="postgresql92-devel-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081930" comment="postgresql92-libs-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081932" comment="postgresql92-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081933" comment="postgresql92-contrib-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081937" comment="postgresql92-docs-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081938" comment="postgresql92-plperl-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081940" comment="postgresql92-plpython-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081942" comment="postgresql92-pltcl-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081944" comment="postgresql92-server-9.2.4-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1901</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081920" comment="libecpg6-32bit-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081921" comment="libecpg6-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081924" comment="libpq5-32bit-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081925" comment="libpq5-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081928" comment="postgresql92-devel-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081930" comment="postgresql92-libs-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081932" comment="postgresql92-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081933" comment="postgresql92-contrib-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081937" comment="postgresql92-docs-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081938" comment="postgresql92-plperl-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081940" comment="postgresql92-plpython-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081942" comment="postgresql92-pltcl-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081944" comment="postgresql92-server-9.2.4-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1904</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1904" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value parameter for the generic_message_footer setting in a save-perf action to index.php, as exploited in the wild in March 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081855" comment="roundcubemail-0.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1914</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090796" comment="glibc-testsuite-2.17-4.7.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090797" comment="glibc-utils-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090798" comment="glibc-utils-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090802" comment="glibc-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090803" comment="glibc-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090807" comment="glibc-devel-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090808" comment="glibc-devel-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090811" comment="glibc-devel-static-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090812" comment="glibc-devel-static-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090813" comment="glibc-extra-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090815" comment="glibc-i18ndata-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090816" comment="glibc-info-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090817" comment="glibc-locale-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090818" comment="glibc-locale-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090821" comment="glibc-obsolete-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090823" comment="glibc-profile-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090824" comment="glibc-profile-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090825" comment="nscd-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090827" comment="glibc-html-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090828" comment="glibc-testsuite-2.17-4.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1915</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915" source="CVE"/>
    <description>
    ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089984" comment="apache2-mod_security2-2.7.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1917</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917" source="CVE"/>
    <description>
    Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1918</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918" source="CVE"/>
    <description>
    Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1919</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919" source="CVE"/>
    <description>
    Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1922</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922" source="CVE"/>
    <description>
    qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1923</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1923" source="CVE"/>
    <description>
    rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082524" comment="nfs-client-1.2.7-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082526" comment="nfs-doc-1.2.7-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082527" comment="nfs-kernel-server-1.2.7-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082529" comment="nfs-utils-1.2.7-2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1926</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets via a crafted applet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082069" comment="icedtea-web-1.3.2-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082072" comment="icedtea-web-javadoc-1.3.2-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082204" comment="icedtea-web-1.4-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082207" comment="icedtea-web-javadoc-1.4-4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1927</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 allows remote attackers to execute arbitrary code via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082069" comment="icedtea-web-1.3.2-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082072" comment="icedtea-web-javadoc-1.3.2-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082204" comment="icedtea-web-1.4-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082207" comment="icedtea-web-javadoc-1.4-4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1929</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929" source="CVE"/>
    <description>
    Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1937</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1937" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in tbl_gis_visualization.php in phpMyAdmin 3.5.x before 3.5.8 might allow remote attackers to inject arbitrary web script or HTML via the (1) visualizationSettings[width] or (2) visualizationSettings[height] parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082732" comment="phpMyAdmin-3.5.8.1-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1940</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" source="CVE"/>
    <description>
    X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082175" comment="xorg-x11-server-7.6_1.13.2-1.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082178" comment="xorg-x11-server-extra-7.6_1.13.2-1.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082180" comment="xorg-x11-server-sdk-7.6_1.13.2-1.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1944</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944" source="CVE"/>
    <description>
    The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081971" comment="curl-7.28.1-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081974" comment="libcurl-devel-7.28.1-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081975" comment="libcurl4-32bit-7.28.1-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081976" comment="libcurl4-7.28.1-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1952</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952" source="CVE"/>
    <description>
    Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1953</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1953" source="CVE"/>
    <description>
    Integer underflow in the input_bmp_reader function in input-bmp.c in AutoTrace 0.31.1 allows context-dependent attackers to have an unspecified impact via a small value in the biSize field in the header of a BMP file, which triggers a buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082548" comment="autotrace-0.31.1-637.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082551" comment="autotrace-devel-0.31.1-637.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082552" comment="libautotrace3-0.31.1-637.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1960</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" source="CVE"/>
    <description>
    Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082211" comment="libtiff-devel-32bit-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082212" comment="libtiff-devel-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082213" comment="libtiff5-32bit-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082214" comment="libtiff5-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082217" comment="tiff-4.0.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1961</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" source="CVE"/>
    <description>
    Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082211" comment="libtiff-devel-32bit-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082212" comment="libtiff-devel-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082213" comment="libtiff5-32bit-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082214" comment="libtiff5-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082217" comment="tiff-4.0.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1962</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1962" source="CVE"/>
    <description>
    The remoteDispatchStoragePoolListAllVolumes function in the storage pool manager in libvirt 1.0.5 allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of requests "to list all volumes for the particular pool."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082358" comment="libvirt-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082359" comment="libvirt-client-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082360" comment="libvirt-client-32bit-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082365" comment="libvirt-devel-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082366" comment="libvirt-devel-32bit-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082367" comment="libvirt-doc-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082368" comment="libvirt-lock-sanlock-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082370" comment="libvirt-python-1.0.2-1.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1968</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1968" source="CVE"/>
    <description>
    Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082531" comment="libsvn_auth_gnome_keyring-1-0-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082533" comment="libsvn_auth_kwallet-1-0-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082535" comment="subversion-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082536" comment="subversion-bash-completion-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082539" comment="subversion-devel-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082540" comment="subversion-perl-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082542" comment="subversion-python-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082544" comment="subversion-server-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082546" comment="subversion-tools-1.7.10-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1969</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1969" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082132" comment="libxml2-2-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082133" comment="libxml2-2-32bit-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082136" comment="libxml2-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082138" comment="libxml2-devel-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082139" comment="libxml2-devel-32bit-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082140" comment="libxml2-doc-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082141" comment="libxml2-tools-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082143" comment="python-libxml2-2.9.0-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1976</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976" source="CVE"/>
    <description>
    The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090978" comment="tomcat-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090979" comment="tomcat-admin-webapps-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090980" comment="tomcat-docs-webapp-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090981" comment="tomcat-el-2_2-api-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090982" comment="tomcat-javadoc-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090983" comment="tomcat-jsp-2_2-api-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090984" comment="tomcat-jsvc-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090985" comment="tomcat-lib-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090986" comment="tomcat-servlet-3_0-api-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090987" comment="tomcat-webapps-7.0.35-2.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1979</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979" source="CVE"/>
    <description>
    The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1981</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082707" comment="libX11-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082708" comment="libX11-6-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082709" comment="libX11-6-32bit-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082712" comment="libX11-data-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082714" comment="libX11-devel-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082715" comment="libX11-devel-32bit-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082716" comment="libX11-xcb1-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082717" comment="libX11-xcb1-32bit-1.5.0-4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082471" comment="libXext-1.3.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082473" comment="libXext-devel-1.3.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082474" comment="libXext-devel-32bit-1.3.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082475" comment="libXext6-1.3.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082476" comment="libXext6-32bit-1.3.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1983</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" source="CVE"/>
    <description>
    Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082479" comment="libXfixes-5.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082481" comment="libXfixes-devel-32bit-5.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082482" comment="libXfixes-devel-5.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082483" comment="libXfixes3-32bit-5.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082484" comment="libXfixes3-5.0-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1984</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082635" comment="libXi-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082637" comment="libXi-devel-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082638" comment="libXi-devel-32bit-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082639" comment="libXi6-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082640" comment="libXi6-32bit-1.6.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1985</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" source="CVE"/>
    <description>
    Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082643" comment="libXinerama-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082645" comment="libXinerama-devel-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082646" comment="libXinerama-devel-32bit-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082647" comment="libXinerama1-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082648" comment="libXinerama1-32bit-1.1.2-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1986</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrandr 1.4.0 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRRQueryOutputProperty and (2) XRRQueryProviderProperty functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082651" comment="libXrandr-1.4.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082653" comment="libXrandr-devel-1.4.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082654" comment="libXrandr-devel-32bit-1.4.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082655" comment="libXrandr2-1.4.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082656" comment="libXrandr2-32bit-1.4.0-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082495" comment="libXrender-0.9.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082497" comment="libXrender-devel-0.9.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082498" comment="libXrender-devel-32bit-0.9.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082499" comment="libXrender1-0.9.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082500" comment="libXrender1-32bit-0.9.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1988</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082659" comment="libXRes1-1.0.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082660" comment="libXRes1-32bit-1.0.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082663" comment="libXres-1.0.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082665" comment="libXres-devel-1.0.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082666" comment="libXres-devel-32bit-1.0.6-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082511" comment="libXv-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082513" comment="libXv-devel-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082514" comment="libXv-devel-32bit-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082515" comment="libXv1-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082516" comment="libXv1-32bit-1.0.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1990</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082675" comment="libXvMC-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082677" comment="libXvMC-devel-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082678" comment="libXvMC-devel-32bit-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082679" comment="libXvMC1-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082680" comment="libXvMC1-32bit-1.0.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1991</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082683" comment="libXxf86dga-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082685" comment="libXxf86dga-devel-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082686" comment="libXxf86dga-devel-32bit-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082687" comment="libXxf86dga1-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082688" comment="libXxf86dga1-32bit-1.1.3-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1992</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082699" comment="libdmx-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082701" comment="libdmx-devel-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082702" comment="libdmx-devel-32bit-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082703" comment="libdmx1-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082704" comment="libdmx1-32bit-1.1.2-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1993</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection and (2) XF86DRIGetClientDriverName functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081979" comment="Mesa-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081980" comment="Mesa-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081984" comment="Mesa-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081985" comment="Mesa-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081986" comment="Mesa-libEGL-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081987" comment="Mesa-libEGL-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081988" comment="Mesa-libEGL1-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081989" comment="Mesa-libEGL1-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081992" comment="Mesa-libGL-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081993" comment="Mesa-libGL-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081994" comment="Mesa-libGL1-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081995" comment="Mesa-libGL1-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081998" comment="Mesa-libGLESv1_CM-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081999" comment="Mesa-libGLESv1_CM-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082000" comment="Mesa-libGLESv1_CM1-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082001" comment="Mesa-libGLESv1_CM1-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082004" comment="Mesa-libGLESv2-2-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082005" comment="Mesa-libGLESv2-2-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082008" comment="Mesa-libGLESv2-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082009" comment="Mesa-libGLESv2-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082010" comment="Mesa-libIndirectGL-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082011" comment="Mesa-libIndirectGL-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082012" comment="Mesa-libIndirectGL1-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082013" comment="Mesa-libIndirectGL1-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082016" comment="Mesa-libglapi-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082017" comment="Mesa-libglapi-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082018" comment="Mesa-libglapi0-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082019" comment="Mesa-libglapi0-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082022" comment="libOSMesa-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082023" comment="libOSMesa-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082024" comment="libOSMesa9-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082025" comment="libOSMesa9-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082028" comment="libXvMC_nouveau-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082029" comment="libXvMC_nouveau-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082032" comment="libXvMC_r300-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082033" comment="libXvMC_r300-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082036" comment="libXvMC_r600-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082037" comment="libXvMC_r600-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082040" comment="libXvMC_softpipe-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082041" comment="libXvMC_softpipe-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082044" comment="libgbm-devel-0.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082045" comment="libgbm-devel-32bit-0.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082046" comment="libgbm1-0.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082047" comment="libgbm1-32bit-0.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082050" comment="libvdpau_nouveau-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082051" comment="libvdpau_nouveau-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082054" comment="libvdpau_r300-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082055" comment="libvdpau_r300-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082058" comment="libvdpau_r600-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082059" comment="libvdpau_r600-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082062" comment="libvdpau_softpipe-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082063" comment="libvdpau_softpipe-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082066" comment="libxatracker-devel-1.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082067" comment="libxatracker1-1.0.0-34.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1995</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" source="CVE"/>
    <description>
    X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082635" comment="libXi-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082637" comment="libXi-devel-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082638" comment="libXi-devel-32bit-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082639" comment="libXi6-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082640" comment="libXi6-32bit-1.6.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1996</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996" source="CVE"/>
    <description>
    X.org libFS 1.0.4 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the FSOpenServer function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082619" comment="libFS-1.0.4-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082621" comment="libFS-devel-1.0.4-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082622" comment="libFS-devel-32bit-1.0.4-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082623" comment="libFS6-1.0.4-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082624" comment="libFS6-32bit-1.0.4-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1997</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082707" comment="libX11-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082708" comment="libX11-6-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082709" comment="libX11-6-32bit-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082712" comment="libX11-data-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082714" comment="libX11-devel-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082715" comment="libX11-devel-32bit-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082716" comment="libX11-xcb1-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082717" comment="libX11-xcb1-32bit-1.5.0-4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1998</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082635" comment="libXi-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082637" comment="libXi-devel-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082638" comment="libXi-devel-32bit-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082639" comment="libXi6-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082640" comment="libXi6-32bit-1.6.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1999</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-1999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" source="CVE"/>
    <description>
    Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082675" comment="libXvMC-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082677" comment="libXvMC-devel-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082678" comment="libXvMC-devel-32bit-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082679" comment="libXvMC1-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082680" comment="libXvMC1-32bit-1.0.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2000</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082683" comment="libXxf86dga-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082685" comment="libXxf86dga-devel-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082686" comment="libXxf86dga-devel-32bit-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082687" comment="libXxf86dga1-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082688" comment="libXxf86dga1-32bit-1.1.3-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2001</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" source="CVE"/>
    <description>
    Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082691" comment="libXxf86vm-1.1.2-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082693" comment="libXxf86vm-devel-1.1.2-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082694" comment="libXxf86vm-devel-32bit-1.1.2-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082695" comment="libXxf86vm1-1.1.2-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082696" comment="libXxf86vm1-32bit-1.1.2-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2002</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" source="CVE"/>
    <description>
    Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082503" comment="libXt-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082505" comment="libXt-devel-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082506" comment="libXt-devel-32bit-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082507" comment="libXt6-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082508" comment="libXt6-32bit-1.1.3-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2003</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" source="CVE"/>
    <description>
    Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082627" comment="libXcursor-1.1.13-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082629" comment="libXcursor-devel-1.1.13-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082630" comment="libXcursor-devel-32bit-1.1.13-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082631" comment="libXcursor1-1.1.13-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082632" comment="libXcursor1-32bit-1.1.13-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2004</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" source="CVE"/>
    <description>
    The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082707" comment="libX11-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082708" comment="libX11-6-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082709" comment="libX11-6-32bit-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082712" comment="libX11-data-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082714" comment="libX11-devel-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082715" comment="libX11-devel-32bit-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082716" comment="libX11-xcb1-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082717" comment="libX11-xcb1-32bit-1.5.0-4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2005</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" source="CVE"/>
    <description>
    X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082503" comment="libXt-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082505" comment="libXt-devel-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082506" comment="libXt-devel-32bit-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082507" comment="libXt6-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082508" comment="libXt6-32bit-1.1.3-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2007</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007" source="CVE"/>
    <description>
    The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082997" comment="qemu-1.3.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083000" comment="qemu-guest-agent-1.3.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083002" comment="qemu-linux-user-1.3.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083004" comment="qemu-tools-1.3.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2013</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2013" source="CVE"/>
    <description>
    The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082778" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082779" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082780" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2020</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020" source="CVE"/>
    <description>
    Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082208" comment="clamav-0.97.8-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2021</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021" source="CVE"/>
    <description>
    pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082208" comment="clamav-0.97.8-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2030</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2030" source="CVE"/>
    <description>
    keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082749" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.10.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082750" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082751" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082752" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082753" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082754" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082755" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082756" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082757" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082758" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082759" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082760" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082761" comment="python-nova-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082762" comment="python-greenlet-0.4.0-3.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082765" comment="python-greenlet-devel-0.4.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2059</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2059" source="CVE"/>
    <description>
    OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082220" comment="openstack-keystone-doc-2012.2.4+git.1363796849.255b1d4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082221" comment="openstack-keystone-2012.2.4+git.1363796849.255b1d4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082222" comment="openstack-keystone-test-2012.2.4+git.1363796849.255b1d4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082223" comment="python-keystone-2012.2.4+git.1363796849.255b1d4-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2061</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061" source="CVE"/>
    <description>
    The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091317" comment="openvpn-2.2.2-9.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091318" comment="openvpn-auth-pam-plugin-2.2.2-9.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091319" comment="openvpn-down-root-plugin-2.2.2-9.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2062</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082487" comment="libXp-1.0.1-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082489" comment="libXp-devel-1.0.1-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082490" comment="libXp-devel-32bit-1.0.1-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082491" comment="libXp6-1.0.1-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082492" comment="libXp6-32bit-1.0.1-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2063</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" source="CVE"/>
    <description>
    Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082667" comment="libXtst-1.2.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082669" comment="libXtst-devel-1.2.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082670" comment="libXtst-devel-32bit-1.2.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082671" comment="libXtst6-1.2.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082672" comment="libXtst6-32bit-1.2.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2064</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" source="CVE"/>
    <description>
    Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082379" comment="libxcb-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082380" comment="libxcb-composite0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082381" comment="libxcb-composite0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082384" comment="libxcb-damage0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082385" comment="libxcb-damage0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082389" comment="libxcb-devel-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082390" comment="libxcb-devel-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082391" comment="libxcb-dpms0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082392" comment="libxcb-dpms0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082395" comment="libxcb-dri2-0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082396" comment="libxcb-dri2-0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082399" comment="libxcb-glx0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082400" comment="libxcb-glx0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082403" comment="libxcb-randr0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082404" comment="libxcb-randr0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082407" comment="libxcb-record0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082408" comment="libxcb-record0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082411" comment="libxcb-render0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082412" comment="libxcb-render0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082415" comment="libxcb-res0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082416" comment="libxcb-res0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082419" comment="libxcb-screensaver0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082420" comment="libxcb-screensaver0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082423" comment="libxcb-shape0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082424" comment="libxcb-shape0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082427" comment="libxcb-shm0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082428" comment="libxcb-shm0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082431" comment="libxcb-sync0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082432" comment="libxcb-sync0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082435" comment="libxcb-xevie0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082436" comment="libxcb-xevie0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082439" comment="libxcb-xf86dri0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082440" comment="libxcb-xf86dri0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082443" comment="libxcb-xfixes0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082444" comment="libxcb-xfixes0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082447" comment="libxcb-xinerama0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082448" comment="libxcb-xinerama0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082451" comment="libxcb-xprint0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082452" comment="libxcb-xprint0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082455" comment="libxcb-xtest0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082456" comment="libxcb-xtest0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082459" comment="libxcb-xv0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082460" comment="libxcb-xv0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082463" comment="libxcb-xvmc0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082464" comment="libxcb-xvmc0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082467" comment="libxcb1-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082468" comment="libxcb1-32bit-1.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2065</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2065" source="CVE"/>
    <description>
    (1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091135" comment="ruby19-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091136" comment="ruby19-devel-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091137" comment="ruby19-devel-extra-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091138" comment="ruby19-doc-ri-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091139" comment="ruby19-tk-1.9.3.p392-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
    <description>
    Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082511" comment="libXv-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082513" comment="libXv-devel-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082514" comment="libXv-devel-32bit-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082515" comment="libXv1-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082516" comment="libXv1-32bit-1.0.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2070</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2070" source="CVE"/>
    <description>
    http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082376" comment="nginx-1.2.9-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2071</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2071" source="CVE"/>
    <description>
    java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090978" comment="tomcat-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090979" comment="tomcat-admin-webapps-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090980" comment="tomcat-docs-webapp-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090981" comment="tomcat-el-2_2-api-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090982" comment="tomcat-javadoc-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090983" comment="tomcat-jsp-2_2-api-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090984" comment="tomcat-jsvc-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090985" comment="tomcat-lib-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090986" comment="tomcat-servlet-3_0-api-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090987" comment="tomcat-webapps-7.0.35-2.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2072</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072" source="CVE"/>
    <description>
    Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2076</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" source="CVE"/>
    <description>
    Xen 4.0.x, 4.1.x, and 4.2.x, when running on AMD64 processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one domain to determine portions of the state of floating point instructions of other domains, which can be leveraged to obtain sensitive information such as cryptographic keys, a similar vulnerability to CVE-2006-1056.  NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2077</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" source="CVE"/>
    <description>
    Xen 4.0.x, 4.1.x, and 4.2.x does not properly restrict the contents of a XRSTOR, which allows local PV guest users to cause a denial of service (unhandled exception and hypervisor crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2078</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" source="CVE"/>
    <description>
    Xen 4.0.2 through 4.0.4, 4.1.x, and 4.2.x allows local PV guest users to cause a denial of service (hypervisor crash) via certain bit combinations to the XSETBV instruction.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2088</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2088" source="CVE"/>
    <description>
    contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082531" comment="libsvn_auth_gnome_keyring-1-0-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082533" comment="libsvn_auth_kwallet-1-0-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082535" comment="subversion-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082536" comment="subversion-bash-completion-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082539" comment="subversion-devel-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082540" comment="subversion-perl-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082542" comment="subversion-python-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082544" comment="subversion-server-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082546" comment="subversion-tools-1.7.10-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2094</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094" source="CVE"/>
    <description>
    The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082295" comment="kernel-debug-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082296" comment="kernel-debug-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082300" comment="kernel-debug-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082302" comment="kernel-default-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082303" comment="kernel-default-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082307" comment="kernel-default-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082309" comment="kernel-desktop-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082310" comment="kernel-desktop-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082314" comment="kernel-desktop-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082316" comment="kernel-docs-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082317" comment="kernel-ec2-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082318" comment="kernel-ec2-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082322" comment="kernel-ec2-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082324" comment="kernel-pae-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082325" comment="kernel-pae-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082329" comment="kernel-pae-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082331" comment="kernel-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082332" comment="kernel-source-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082333" comment="kernel-source-vanilla-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082334" comment="kernel-syms-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082335" comment="kernel-trace-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082336" comment="kernel-trace-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082340" comment="kernel-trace-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082342" comment="kernel-vanilla-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082345" comment="kernel-vanilla-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082347" comment="kernel-xen-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082348" comment="kernel-xen-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082352" comment="kernel-xen-devel-3.7.10-1.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2099</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2099" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099893" comment="libpython3_3m1_0-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099894" comment="libpython3_3m1_0-32bit-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099895" comment="python3-base-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099896" comment="python3-base-32bit-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099897" comment="python3-devel-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099898" comment="python3-idle-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099899" comment="python3-testsuite-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099900" comment="python3-tools-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099901" comment="python3-doc-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099902" comment="python3-doc-pdf-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099903" comment="python3-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099904" comment="python3-32bit-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099905" comment="python3-curses-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099906" comment="python3-dbm-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099907" comment="python3-tk-3.3.0-6.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2104</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2104" source="CVE"/>
    <description>
    python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082774" comment="openstack-keystone-doc-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082775" comment="openstack-keystone-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082776" comment="openstack-keystone-test-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082777" comment="python-keystone-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2112</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2112" source="CVE"/>
    <description>
    The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082531" comment="libsvn_auth_gnome_keyring-1-0-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082533" comment="libsvn_auth_kwallet-1-0-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082535" comment="subversion-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082536" comment="subversion-bash-completion-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082539" comment="subversion-devel-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082540" comment="subversion-perl-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082542" comment="subversion-python-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082544" comment="subversion-server-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082546" comment="subversion-tools-1.7.10-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2117</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2117" source="CVE"/>
    <description>
    Directory traversal vulnerability in the cgit_parse_readme function in ui-summary.c in cgit before 0.9.2, when a readme file is set to a filesystem path, allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083009" comment="cgit-0.9.1-8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2126</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2126" source="CVE"/>
    <description>
    Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082720" comment="darktable-1.1.3-1.5.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082723" comment="darktable-doc-1.1.3-1.5.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082724" comment="darktable-1.1.3-1.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082727" comment="darktable-doc-1.1.3-1.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082733" comment="libraw-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082735" comment="libraw-devel-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082736" comment="libraw-devel-static-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082737" comment="libraw-tools-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082739" comment="libraw5-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082741" comment="libraw-0.14.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082743" comment="libraw-devel-0.14.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082744" comment="libraw-devel-static-0.14.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082745" comment="libraw-tools-0.14.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082747" comment="libraw5-0.14.7-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2131</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2131" source="CVE"/>
    <description>
    Format string vulnerability in the rrdtool module 1.4.7 for Python, as used in Zenoss, allows context-dependent attackers to cause a denial of service (crash) via format string specifiers to the rrdtool.graph function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102757" comment="lua-rrdtool-1.4.7-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102758" comment="python-rrdtool-1.4.7-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102759" comment="rrdtool-1.4.7-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102760" comment="rrdtool-devel-1.4.7-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102761" comment="tcl-rrdtool-1.4.7-8.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2132</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2132" source="CVE"/>
    <description>
    bson/_cbsonmodule.c in the mongo-python-driver (aka. pymongo) before 2.5.2, as used in MongoDB, allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to decoding of an "invalid DBRef."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082554" comment="python-pymongo-2.4.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082557" comment="python3-pymongo-2.4.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2139</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2139" source="CVE"/>
    <description>
    Buffer overflow in srtp.c in libsrtp in srtp 1.4.5 and earlier allows remote attackers to cause a denial of service (crash) via vectors related to a length inconsistency in the crypto_policy_set_from_profile_for_rtp and srtp_protect functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083169" comment="libsrtp1-1.4.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083171" comment="srtp-1.4.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083173" comment="srtp-devel-1.4.4-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2141</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141" source="CVE"/>
    <description>
    The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2145</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2145" source="CVE"/>
    <description>
    The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082897" comment="perl-Module-Signature-0.73-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2148</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2148" source="CVE"/>
    <description>
    The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2157</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2157" source="CVE"/>
    <description>
    OpenStack Keystone Folsom, Grizzly before 2013.1.3, and Havana, when using LDAP with Anonymous binding, allows remote attackers to bypass authentication via an empty password.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082774" comment="openstack-keystone-doc-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082775" comment="openstack-keystone-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082776" comment="openstack-keystone-test-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082777" comment="python-keystone-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2161</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2161" source="CVE"/>
    <description>
    XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082766" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082767" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082768" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082769" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082770" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082771" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082772" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082773" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2164</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164" source="CVE"/>
    <description>
    The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2168</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168" source="CVE"/>
    <description>
    The _dbus_printf_string_upper_bound function in dbus/dbus-sysdeps-unix.c in D-Bus (aka DBus) 1.4.x before 1.4.26, 1.6.x before 1.6.12, and 1.7.x before 1.7.4 allows local users to cause a denial of service (service crash) via a crafted message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082802" comment="dbus-1-x11-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082805" comment="dbus-1-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082806" comment="dbus-1-32bit-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082810" comment="dbus-1-devel-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082811" comment="dbus-1-devel-32bit-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082812" comment="dbus-1-devel-doc-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082813" comment="libdbus-1-3-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082814" comment="libdbus-1-3-32bit-1.6.8-2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2174</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174" source="CVE"/>
    <description>
    Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082820" comment="curl-7.28.1-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082823" comment="libcurl-devel-7.28.1-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082824" comment="libcurl4-32bit-7.28.1-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082825" comment="libcurl4-7.28.1-4.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2178</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2178" source="CVE"/>
    <description>
    The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082781" comment="fail2ban-0.8.8-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094033" comment="fail2ban-0.8.12-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2179</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2179" source="CVE"/>
    <description>
    X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the "!" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082817" comment="xdm-1.1.10-14.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2186</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186" source="CVE"/>
    <description>
    The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091110" comment="jakarta-commons-fileupload-1.1.1-114.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091111" comment="jakarta-commons-fileupload-javadoc-1.1.1-114.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2190</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2190" source="CVE"/>
    <description>
    The translate_hierarchy_event function in x11/clutter-device-manager-xi2.c in Clutter, when resuming the system, does not properly handle XIQueryDevice errors when a device has "disappeared," which causes the gnome-shell to crash and allows physically proximate attackers to access the previous gnome-shell session via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091000" comment="clutter-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091001" comment="clutter-devel-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091002" comment="clutter-lang-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091003" comment="libclutter-1_0-0-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091004" comment="libclutter-1_0-0-32bit-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091005" comment="typelib-1_0-Clutter-1_0-1.12.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2191</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2191" source="CVE"/>
    <description>
    python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof Bugzilla servers via a crafted certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082870" comment="python-bugzilla-0.6.2-8.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2206</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2206" source="CVE"/>
    <description>
    The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2207</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" source="CVE"/>
    <description>
    pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090796" comment="glibc-testsuite-2.17-4.7.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090797" comment="glibc-utils-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090798" comment="glibc-utils-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090802" comment="glibc-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090803" comment="glibc-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090807" comment="glibc-devel-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090808" comment="glibc-devel-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090811" comment="glibc-devel-static-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090812" comment="glibc-devel-static-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090813" comment="glibc-extra-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090815" comment="glibc-i18ndata-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090816" comment="glibc-info-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090817" comment="glibc-locale-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090818" comment="glibc-locale-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090821" comment="glibc-obsolete-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090823" comment="glibc-profile-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090824" comment="glibc-profile-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090825" comment="nscd-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090827" comment="glibc-html-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090828" comment="glibc-testsuite-2.17-4.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2212</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212" source="CVE"/>
    <description>
    The vmx_set_uc_mode function in Xen 3.3 through 4.3, when disabling chaches, allows local HVM guests with access to memory mapped I/O regions to cause a denial of service (CPU consumption and possibly hypervisor or guest kernel panic) via a crafted GFN range.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2214</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2214" source="CVE"/>
    <description>
    status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi.  NOTE: this behavior is by design in most 3.x versions, but the upstream vendor "decided to change it for Nagios 4" and 3.5.1.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082871" comment="nagios-3.5.0-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082874" comment="nagios-devel-3.5.0-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082875" comment="nagios-www-3.5.0-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082876" comment="nagios-www-dch-3.5.0-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2217</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2217" source="CVE"/>
    <description>
    cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP queries and possibly have other unspecified impact via a symlink attack on a cache file with a predictable name in /tmp/suds/.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082996" comment="python-suds-0.4-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2221</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2221" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ZRtp::storeMsgTemp function in GNU ZRTPCPP before 3.2.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091122" comment="libzrtpcpp-2.0.0-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091123" comment="libzrtpcpp-devel-2.0.0-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091124" comment="libzrtpcpp2-2.0.0-8.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2222</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2222" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in GNU ZRTPCPP before 3.2.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ZRTP Hello packet to the (1) ZRtp::findBestSASType, (2) ZRtp::findBestAuthLen, (3) ZRtp::findBestCipher, (4) ZRtp::findBestHash, or (5) ZRtp::findBestPubKey functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091122" comment="libzrtpcpp-2.0.0-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091123" comment="libzrtpcpp-devel-2.0.0-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091124" comment="libzrtpcpp2-2.0.0-8.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2223</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2223" source="CVE"/>
    <description>
    GNU ZRTPCPP before 3.2.0 allows remote attackers to obtain sensitive information (uninitialized heap memory) or cause a denial of service (out-of-bounds read) via a crafted packet, as demonstrated by a truncated Ping packet that is not properly handled by the getEpHash function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091122" comment="libzrtpcpp-2.0.0-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091123" comment="libzrtpcpp-devel-2.0.0-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091124" comment="libzrtpcpp2-2.0.0-8.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2232</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2232" source="CVE"/>
    <description>
    The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2234</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234" source="CVE"/>
    <description>
    The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2237</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2237" source="CVE"/>
    <description>
    The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2266</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266" source="CVE"/>
    <description>
    libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081810" comment="bind-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081811" comment="bind-chrootenv-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081814" comment="bind-devel-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081815" comment="bind-doc-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081816" comment="bind-libs-32bit-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081817" comment="bind-libs-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081820" comment="bind-lwresd-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081822" comment="bind-utils-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081824" comment="dhcp-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081825" comment="dhcp-client-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081829" comment="dhcp-devel-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081830" comment="dhcp-doc-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081831" comment="dhcp-relay-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081833" comment="dhcp-server-4.2.5.P1-0.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2274</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2274" source="CVE"/>
    <description>
    Puppet 2.6.x before 2.6.18 and Puppet Enterprise 1.2.x before 1.2.7 allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled, via a crafted request for a report.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2275</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2275" source="CVE"/>
    <description>
    The default configuration for puppet masters 0.25.0 and later in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, allows remote authenticated nodes to submit reports for other nodes via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2383</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "handling of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2384</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font layout" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2407</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2412</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2415</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2415" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows local users to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "processing of MTOM attachments" and the creation of temporary files with weak permissions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2417</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2419</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font processing errors" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2420</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2421</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2421" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect MethodHandle lookups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2422</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2423</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2423" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2424</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient class access checks" when "creating new instances" using MBeanInstantiator.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2426</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2426" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect invocation of the defaultReadObject method in the ConcurrentHashMap class, which allows remote attackers to bypass the Java sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2429</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageWriter state corruption" when using native code, which triggers memory corruption.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2430</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageReader state corruption" when using native code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2431</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2431" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to bypassing the Java sandbox using "method handle intrinsic frames."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2436</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2436" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-1488 and CVE-2013-2426.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "type checks" and "method handle binding" involving Wrapper.convert.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2443</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect "checking order" within the AccessControlContext class.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2444</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not "properly manage and restrict certain resources related to the processing of fonts," possibly involving temporary files.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2445</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2445" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Hotspot.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "handling of memory allocation errors."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2446</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2447</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket's local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2448</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient "access restrictions" and "robustness of sound classes."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2449</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2449" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to GnomeFileTypeDetector and a missing check for read permissions for a path.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2450</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2451</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2452</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "network address handling in virtual machine identifiers" and the lack of "unique and unpredictable IDs" in the java.rmi.dgc.VMID class.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2453</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for "package access" by the MBeanServer Introspector.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2454</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2455</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2456</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2457</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2458</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2458" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via "an error related to method handles."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2459</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "integer overflow checks."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2460</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2461</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier; the Oracle JRockit component in Oracle Fusion Middleware R27.7.5 and earlier and R28.2.7 and earlier; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June and July 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass verification of XML signatures via vectors related to a "Missing check for [a] valid DOMCanonicalizationMethod canonicalization algorithm."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2463</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2465</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2469</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2470</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "ImagingLib byte lookup processing."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2471</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2472</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2473</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2475</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2475" source="CVE"/>
    <description>
    The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2476</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2476" source="CVE"/>
    <description>
    The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2477</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2477" source="CVE"/>
    <description>
    The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2478</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2478" source="CVE"/>
    <description>
    The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2479</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2479" source="CVE"/>
    <description>
    The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2480</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2480" source="CVE"/>
    <description>
    The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2481</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2481" source="CVE"/>
    <description>
    Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2482</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2482" source="CVE"/>
    <description>
    The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2483</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2483" source="CVE"/>
    <description>
    The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2484</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2484" source="CVE"/>
    <description>
    The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2485</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2485" source="CVE"/>
    <description>
    The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2486</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486" source="CVE"/>
    <description>
    The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082372" comment="wireshark-1.8.7-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082375" comment="wireshark-devel-1.8.7-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2487</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487" source="CVE"/>
    <description>
    epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082372" comment="wireshark-1.8.7-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082375" comment="wireshark-devel-1.8.7-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2488</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2488" source="CVE"/>
    <description>
    The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2492</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2492" source="CVE"/>
    <description>
    Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081497" comment="firebird-classic-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081500" comment="libfbembed-devel-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081501" comment="libfbembed2_5-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081503" comment="firebird-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081504" comment="firebird-32bit-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081508" comment="firebird-devel-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081509" comment="firebird-doc-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081510" comment="firebird-superserver-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081512" comment="libfbclient2-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081513" comment="libfbclient2-32bit-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081516" comment="libfbclient2-devel-2.5.2.26539-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2503</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2503" source="CVE"/>
    <description>
    Privoxy before 3.0.21 does not properly handle Proxy-Authenticate and Proxy-Authorization headers in the client-server data stream, which makes it easier for remote HTTP servers to spoof the intended proxy service via a 407 (aka Proxy Authentication Required) HTTP status code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079318" comment="privoxy-3.0.21-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079321" comment="privoxy-doc-3.0.21-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2546</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2546" source="CVE"/>
    <description>
    The report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2547</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2547" source="CVE"/>
    <description>
    The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 does not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2548</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2548" source="CVE"/>
    <description>
    The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect length value during a copy operation, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2625</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2625" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089981" comment="otrs-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089982" comment="otrs-doc-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089983" comment="otrs-itsm-3.1.10-26.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2634</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2634" source="CVE"/>
    <description>
    net/dcb/dcbnl.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2635</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2635" source="CVE"/>
    <description>
    The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2637</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2637" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089981" comment="otrs-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089982" comment="otrs-doc-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089983" comment="otrs-itsm-3.1.10-26.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2765</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765" source="CVE"/>
    <description>
    The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089984" comment="apache2-mod_security2-2.7.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2838</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2838" source="CVE"/>
    <description>
    Google V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082878" comment="chromedriver-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082880" comment="chromium-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082883" comment="chromium-desktop-gnome-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082884" comment="chromium-desktop-kde-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082885" comment="chromium-ffmpegsumo-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082887" comment="chromium-suid-helper-30.0.1553.0-1.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2850</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2850" source="CVE"/>
    <description>
    Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082560" comment="kernel-debug-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082561" comment="kernel-debug-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082565" comment="kernel-debug-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082567" comment="kernel-default-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082568" comment="kernel-default-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082572" comment="kernel-default-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082574" comment="kernel-desktop-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082575" comment="kernel-desktop-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082579" comment="kernel-desktop-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082581" comment="kernel-docs-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082582" comment="kernel-ec2-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082583" comment="kernel-ec2-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082587" comment="kernel-ec2-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082589" comment="kernel-pae-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082590" comment="kernel-pae-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082594" comment="kernel-pae-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082596" comment="kernel-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082597" comment="kernel-source-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082598" comment="kernel-source-vanilla-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082599" comment="kernel-syms-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082600" comment="kernel-trace-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082601" comment="kernel-trace-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082605" comment="kernel-trace-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082607" comment="kernel-vanilla-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082610" comment="kernel-vanilla-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082612" comment="kernel-xen-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082613" comment="kernel-xen-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082617" comment="kernel-xen-devel-3.7.10-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2851</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851" source="CVE"/>
    <description>
    Format string vulnerability in the register_disk function in block/genhd.c in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and writing format string specifiers to /sys/module/md_mod/parameters/new_array in order to create a crafted /dev/md device name.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2852</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2852" source="CVE"/>
    <description>
    Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2877</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877" source="CVE"/>
    <description>
    parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083021" comment="libxml2-2-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083022" comment="libxml2-2-32bit-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083025" comment="libxml2-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083027" comment="libxml2-devel-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083028" comment="libxml2-devel-32bit-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083029" comment="libxml2-doc-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083030" comment="libxml2-tools-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083032" comment="python-libxml2-2.9.0-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2889</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889" source="CVE"/>
    <description>
    drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2891</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2891" source="CVE"/>
    <description>
    drivers/hid/hid-steelseries.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_STEELSERIES is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2906</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2906" source="CVE"/>
    <description>
    Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.cpp, core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2907</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2907" source="CVE"/>
    <description>
    The Window.prototype object implementation in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2908</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2908" source="CVE"/>
    <description>
    Google Chrome before 30.0.1599.66 uses incorrect function calls to determine the values of NavigationEntry objects, which allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2909</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2909" source="CVE"/>
    <description>
    Use-after-free vulnerability in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to inline-block rendering for bidirectional Unicode text in an element isolated from its siblings.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2910</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2910" source="CVE"/>
    <description>
    Use-after-free vulnerability in modules/webaudio/AudioScheduledSourceNode.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2911</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2911" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XSLStyleSheet::compileStyleSheet function in core/xml/XSLStyleSheetLibxslt.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of post-failure recompilation in unspecified libxslt versions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2912</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2912" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PepperInProcessRouter::SendToHost function in content/renderer/pepper/pepper_in_process_router.cc in the Pepper Plug-in API (PPAPI) in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a resource-destruction message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2913</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2913" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2914</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2914" source="CVE"/>
    <description>
    Use-after-free vulnerability in the color-chooser dialog in Google Chrome before 30.0.1599.66 on Windows allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to color_chooser_dialog.cc and color_chooser_win.cc in browser/ui/views/.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2915</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2915" source="CVE"/>
    <description>
    Google Chrome before 30.0.1599.66 preserves pending NavigationEntry objects in certain invalid circumstances, which allows remote attackers to spoof the address bar via a URL with a malformed scheme, as demonstrated by a nonexistent:12121 URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2916</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2916" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code, in conjunction with a delay in notifying the user of an attempted spoof.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2917</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2917" source="CVE"/>
    <description>
    The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2918</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2918" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RenderBlock::collapseAnonymousBlockChild function in core/rendering/RenderBlock.cpp in the DOM implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect handling of parent-child relationships for anonymous blocks.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2919</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2919" source="CVE"/>
    <description>
    Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2920</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2920" source="CVE"/>
    <description>
    The DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via a relative URL containing a hostname, as demonstrated by a protocol-relative URL beginning with a //www.google.com/ substring.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2921</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2921" source="CVE"/>
    <description>
    Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2922</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2922" source="CVE"/>
    <description>
    Use-after-free vulnerability in core/html/HTMLTemplateElement.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that operates on a TEMPLATE element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2923</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2923" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.66 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2924</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2924" source="CVE"/>
    <description>
    Use-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2925</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2925" source="CVE"/>
    <description>
    Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2926</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2926" source="CVE"/>
    <description>
    Use-after-free vulnerability in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to list elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2927</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2927" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2928</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2928" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2931</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2931" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2944</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-2944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2944" source="CVE"/>
    <description>
    strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082181" comment="strongswan-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082183" comment="strongswan-doc-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082184" comment="strongswan-ipsec-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082186" comment="strongswan-libs0-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082188" comment="strongswan-mysql-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082190" comment="strongswan-nm-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082192" comment="strongswan-sqlite-5.0.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3004</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3004" source="CVE"/>
    <description>
    Directory traversal vulnerability in BIRT-Report Viewer in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.x and 7.2.x before 7.2.1.5 allows remote authenticated users to read arbitrary files via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096790" comment="castor-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096791" comment="castor-demo-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096792" comment="castor-doc-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096793" comment="castor-javadoc-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096794" comment="castor-test-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096795" comment="castor-xml-0.9.5-317.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3222</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222" source="CVE"/>
    <description>
    The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3223</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223" source="CVE"/>
    <description>
    The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3224</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224" source="CVE"/>
    <description>
    The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3226</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3226" source="CVE"/>
    <description>
    The sco_sock_recvmsg function in net/bluetooth/sco.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3227</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227" source="CVE"/>
    <description>
    The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3228</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228" source="CVE"/>
    <description>
    The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3229</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229" source="CVE"/>
    <description>
    The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3230</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3230" source="CVE"/>
    <description>
    The l2tp_ip6_recvmsg function in net/l2tp/l2tp_ip6.c in the Linux kernel before 3.9-rc7 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3231</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231" source="CVE"/>
    <description>
    The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3232</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3232" source="CVE"/>
    <description>
    The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3233</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3233" source="CVE"/>
    <description>
    The llcp_sock_recvmsg function in net/nfc/llcp/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable and a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3234</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234" source="CVE"/>
    <description>
    The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3235</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235" source="CVE"/>
    <description>
    net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3238</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3238" source="CVE"/>
    <description>
    phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3 allows remote authenticated users to execute arbitrary code via a /e\x00 sequence, which is not properly handled before making a preg_replace function call within the "Replace table prefix" feature.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082732" comment="phpMyAdmin-3.5.8.1-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3239</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239" source="CVE"/>
    <description>
    phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082732" comment="phpMyAdmin-3.5.8.1-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3301</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3301" source="CVE"/>
    <description>
    The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then making an lseek system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3551</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3551" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089981" comment="otrs-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089982" comment="otrs-doc-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089983" comment="otrs-itsm-3.1.10-26.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3555</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" source="CVE"/>
    <description>
    epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082728" comment="wireshark-1.8.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082731" comment="wireshark-devel-1.8.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3556</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556" source="CVE"/>
    <description>
    The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082728" comment="wireshark-1.8.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082731" comment="wireshark-devel-1.8.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3557</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" source="CVE"/>
    <description>
    The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082728" comment="wireshark-1.8.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082731" comment="wireshark-devel-1.8.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3558</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" source="CVE"/>
    <description>
    The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082728" comment="wireshark-1.8.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082731" comment="wireshark-devel-1.8.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3559</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" source="CVE"/>
    <description>
    epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082728" comment="wireshark-1.8.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082731" comment="wireshark-devel-1.8.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3560</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" source="CVE"/>
    <description>
    The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082728" comment="wireshark-1.8.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082731" comment="wireshark-devel-1.8.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3561</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561" source="CVE"/>
    <description>
    Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082728" comment="wireshark-1.8.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082731" comment="wireshark-devel-1.8.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3562</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" source="CVE"/>
    <description>
    Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082728" comment="wireshark-1.8.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082731" comment="wireshark-devel-1.8.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3567</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3567" source="CVE"/>
    <description>
    Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090291" comment="puppet-3.0.2-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090292" comment="puppet-server-3.0.2-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3704</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3704" source="CVE"/>
    <description>
    The RPM GPG key import and handling feature in libzypp 12.15.0 and earlier reports a different key fingerprint than the one used to sign a repository when multiple key blobs are used, which might allow remote attackers to trick users into believing that the repository was signed by a more-trustworthy key.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090390" comment="libzypp-12.15.0-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090393" comment="libzypp-devel-12.15.0-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3709</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3709" source="CVE"/>
    <description>
    WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092276" comment="webyast-base-0.3.43.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092277" comment="webyast-base-branding-default-0.3.43.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092278" comment="webyast-base-testsuite-0.3.43.1-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3829</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-3829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4002</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect availability via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4073</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073" source="CVE"/>
    <description>
    The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082889" comment="ruby19-1.9.3.p392-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082892" comment="ruby19-devel-1.9.3.p392-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082893" comment="ruby19-devel-extra-1.9.3.p392-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082894" comment="ruby19-doc-ri-1.9.3.p392-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082895" comment="ruby19-tk-1.9.3.p392-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4088</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4088" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089981" comment="otrs-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089982" comment="otrs-doc-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089983" comment="otrs-itsm-3.1.10-26.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4111</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4111" source="CVE"/>
    <description>
    The Python client library for Glance (python-glanceclient) before 0.10.0 does not properly check the preverify_ok value, which prevents the server hostname from being verified with a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate and allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090044" comment="python-glanceclient-0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090045" comment="python-glanceclient-test-0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4113</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113" source="CVE"/>
    <description>
    ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083036" comment="apache2-mod_php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083038" comment="php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083039" comment="php5-bcmath-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083041" comment="php5-bz2-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083043" comment="php5-calendar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083045" comment="php5-ctype-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083047" comment="php5-curl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083049" comment="php5-dba-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083053" comment="php5-devel-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083054" comment="php5-dom-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083056" comment="php5-enchant-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083058" comment="php5-exif-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083060" comment="php5-fastcgi-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083062" comment="php5-fileinfo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083064" comment="php5-fpm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083066" comment="php5-ftp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083068" comment="php5-gd-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083070" comment="php5-gettext-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083072" comment="php5-gmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083074" comment="php5-iconv-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083076" comment="php5-imap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083078" comment="php5-intl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083080" comment="php5-json-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083082" comment="php5-ldap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083084" comment="php5-mbstring-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083086" comment="php5-mcrypt-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083088" comment="php5-mssql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083090" comment="php5-mysql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083092" comment="php5-odbc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083094" comment="php5-openssl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083096" comment="php5-pcntl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083098" comment="php5-pdo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083100" comment="php5-pear-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083101" comment="php5-pgsql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083103" comment="php5-phar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083105" comment="php5-posix-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083107" comment="php5-pspell-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083109" comment="php5-readline-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083111" comment="php5-shmop-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083113" comment="php5-snmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083115" comment="php5-soap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083117" comment="php5-sockets-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083119" comment="php5-sqlite-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083121" comment="php5-suhosin-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083123" comment="php5-sysvmsg-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083125" comment="php5-sysvsem-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083127" comment="php5-sysvshm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083129" comment="php5-tidy-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083131" comment="php5-tokenizer-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083133" comment="php5-wddx-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083135" comment="php5-xmlreader-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083137" comment="php5-xmlrpc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083139" comment="php5-xmlwriter-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083141" comment="php5-xsl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083143" comment="php5-zip-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083145" comment="php5-zlib-5.3.17-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4114</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4114" source="CVE"/>
    <description>
    The automatic update request in Nagstamont before 0.9.10 uses a cleartext base64 format for transmission of a username and password, which allows remote attackers to obtain sensitive information by sniffing the network.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083035" comment="nagstamon-0.9.10-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4115</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115" source="CVE"/>
    <description>
    Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090527" comment="squid-3.2.11-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4123</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4123" source="CVE"/>
    <description>
    client_side_request.cc in Squid 3.2.x before 3.2.13 and 3.3.x before 3.3.8 allows remote attackers to cause a denial of service via a crafted port number in a HTTP Host header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090527" comment="squid-3.2.11-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4124</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124" source="CVE"/>
    <description>
    Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090121" comment="samba-doc-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090122" comment="libnetapi-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090123" comment="libnetapi0-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090125" comment="libsmbclient-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090126" comment="libsmbclient0-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090127" comment="libsmbclient0-32bit-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090130" comment="libsmbsharemodes-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090131" comment="libsmbsharemodes0-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090133" comment="libwbclient-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090134" comment="libwbclient0-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090135" comment="libwbclient0-32bit-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090138" comment="samba-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090139" comment="samba-32bit-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090140" comment="samba-client-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090141" comment="samba-client-32bit-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090147" comment="samba-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090148" comment="samba-krb-printing-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090150" comment="samba-winbind-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090151" comment="samba-winbind-32bit-3.6.12-59.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4131</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4131" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083180" comment="libsvn_auth_gnome_keyring-1-0-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083182" comment="libsvn_auth_kwallet-1-0-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083184" comment="subversion-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083185" comment="subversion-bash-completion-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083188" comment="subversion-devel-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083189" comment="subversion-perl-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083191" comment="subversion-python-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083193" comment="subversion-server-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083195" comment="subversion-tools-1.7.11-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4132</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132" source="CVE"/>
    <description>
    KDE-Workspace 4.10.5 and earlier does not properly handle the return value of the glibc 2.17 crypt and pw_encrypt functions, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via (1) an invalid salt or a (2) DES or (3) MD5 encrypted password, when FIPS-140 is enable, to KDM or an (4) invalid password to KCheckPass.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083147" comment="kde4-kgreeter-plugins-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083149" comment="kdebase4-workspace-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083150" comment="kdebase4-workspace-branding-upstream-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083153" comment="kdebase4-workspace-devel-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083155" comment="kdebase4-workspace-ksysguardd-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083157" comment="kdebase4-workspace-liboxygenstyle-32bit-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083158" comment="kdebase4-workspace-liboxygenstyle-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083161" comment="kdebase4-workspace-plasma-calendar-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083163" comment="kdm-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083164" comment="kdm-branding-upstream-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083166" comment="kwin-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083168" comment="python-kdebase4-4.10.5-1.111.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4156</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4156" source="CVE"/>
    <description>
    Apache OpenOffice.org (OOo) before 4.0 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted element in an OOXML document file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100165" comment="libreoffice-branding-upstream-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100166" comment="libreoffice-help-en-US-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100167" comment="libreoffice-help-ast-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100168" comment="libreoffice-help-bg-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100169" comment="libreoffice-help-ca-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100170" comment="libreoffice-help-cs-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100171" comment="libreoffice-help-da-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100172" comment="libreoffice-help-de-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100173" comment="libreoffice-help-en-GB-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100174" comment="libreoffice-help-group1-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100175" comment="libreoffice-help-el-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100176" comment="libreoffice-help-en-ZA-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100177" comment="libreoffice-help-es-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100178" comment="libreoffice-help-et-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100179" comment="libreoffice-help-eu-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100180" comment="libreoffice-help-fi-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100181" comment="libreoffice-help-fr-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100182" comment="libreoffice-help-group2-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100183" comment="libreoffice-help-gl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100184" comment="libreoffice-help-group3-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100185" comment="libreoffice-help-gu-IN-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100186" comment="libreoffice-help-hi-IN-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100187" comment="libreoffice-help-hu-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100188" comment="libreoffice-help-it-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100189" comment="libreoffice-help-ja-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100190" comment="libreoffice-help-km-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100191" comment="libreoffice-help-group4-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100192" comment="libreoffice-help-ko-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100193" comment="libreoffice-help-mk-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100194" comment="libreoffice-help-nb-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100195" comment="libreoffice-help-nl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100196" comment="libreoffice-help-pl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100197" comment="libreoffice-help-pt-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100198" comment="libreoffice-help-pt-BR-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100199" comment="libreoffice-help-group5-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100200" comment="libreoffice-help-ru-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100201" comment="libreoffice-help-sk-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100202" comment="libreoffice-help-sl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100203" comment="libreoffice-help-sv-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100204" comment="libreoffice-help-tr-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100205" comment="libreoffice-help-vi-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100206" comment="libreoffice-help-zh-CN-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100207" comment="libreoffice-help-zh-TW-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100208" comment="libreoffice-icon-theme-crystal-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100209" comment="libreoffice-icon-theme-galaxy-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100210" comment="libreoffice-icon-theme-hicontrast-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100211" comment="libreoffice-icon-theme-oxygen-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100212" comment="libreoffice-icon-theme-tango-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100213" comment="libreoffice-icon-themes-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100214" comment="libreoffice-l10n-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100215" comment="libreoffice-l10n-af-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100216" comment="libreoffice-l10n-am-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100217" comment="libreoffice-l10n-ar-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100218" comment="libreoffice-l10n-as-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100219" comment="libreoffice-l10n-ast-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100220" comment="libreoffice-l10n-be-BY-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100221" comment="libreoffice-l10n-bg-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100222" comment="libreoffice-l10n-br-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100223" comment="libreoffice-l10n-ca-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100224" comment="libreoffice-l10n-cs-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100225" comment="libreoffice-l10n-cy-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100226" comment="libreoffice-l10n-da-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100227" comment="libreoffice-l10n-de-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100228" comment="libreoffice-l10n-el-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100229" comment="libreoffice-l10n-en-GB-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100230" comment="libreoffice-l10n-en-ZA-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100231" comment="libreoffice-l10n-eo-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100232" comment="libreoffice-l10n-es-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100233" comment="libreoffice-l10n-et-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100234" comment="libreoffice-l10n-eu-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100235" comment="libreoffice-l10n-fi-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100236" comment="libreoffice-l10n-fr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100237" comment="libreoffice-l10n-ga-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100238" comment="libreoffice-l10n-gd-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100239" comment="libreoffice-l10n-gl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100240" comment="libreoffice-l10n-gu-IN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100241" comment="libreoffice-l10n-he-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100242" comment="libreoffice-l10n-hi-IN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100243" comment="libreoffice-l10n-hr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100244" comment="libreoffice-l10n-hu-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100245" comment="libreoffice-l10n-id-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100246" comment="libreoffice-l10n-is-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100247" comment="libreoffice-l10n-it-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100248" comment="libreoffice-l10n-ja-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100249" comment="libreoffice-l10n-ka-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100250" comment="libreoffice-l10n-km-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100251" comment="libreoffice-l10n-kn-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100252" comment="libreoffice-l10n-ko-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100253" comment="libreoffice-l10n-lt-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100254" comment="libreoffice-l10n-mk-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100255" comment="libreoffice-l10n-ml-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100256" comment="libreoffice-l10n-mr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100257" comment="libreoffice-l10n-nb-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100258" comment="libreoffice-l10n-nl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100259" comment="libreoffice-l10n-nn-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100260" comment="libreoffice-l10n-nr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100261" comment="libreoffice-l10n-om-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100262" comment="libreoffice-l10n-or-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100263" comment="libreoffice-l10n-pa-IN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100264" comment="libreoffice-l10n-pl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100265" comment="libreoffice-l10n-pt-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100266" comment="libreoffice-l10n-pt-BR-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100267" comment="libreoffice-l10n-ro-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100268" comment="libreoffice-l10n-ru-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100269" comment="libreoffice-l10n-rw-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100270" comment="libreoffice-l10n-sh-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100271" comment="libreoffice-l10n-sk-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100272" comment="libreoffice-l10n-sl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100273" comment="libreoffice-l10n-sr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100274" comment="libreoffice-l10n-ss-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100275" comment="libreoffice-l10n-st-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100276" comment="libreoffice-l10n-sv-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100277" comment="libreoffice-l10n-ta-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100278" comment="libreoffice-l10n-te-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100279" comment="libreoffice-l10n-tg-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100280" comment="libreoffice-l10n-th-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100281" comment="libreoffice-l10n-tr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100282" comment="libreoffice-l10n-ts-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100283" comment="libreoffice-l10n-ug-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100284" comment="libreoffice-l10n-uk-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100285" comment="libreoffice-l10n-ve-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100286" comment="libreoffice-l10n-vi-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100287" comment="libreoffice-l10n-xh-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100288" comment="libreoffice-l10n-zh-CN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100289" comment="libreoffice-l10n-zh-TW-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100290" comment="libreoffice-l10n-zu-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100291" comment="libreoffice-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100292" comment="libreoffice-base-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100293" comment="libreoffice-base-drivers-mysql-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100294" comment="libreoffice-base-drivers-postgresql-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100295" comment="libreoffice-base-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100296" comment="libreoffice-calc-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100297" comment="libreoffice-calc-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100298" comment="libreoffice-draw-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100299" comment="libreoffice-draw-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100300" comment="libreoffice-filters-optional-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100301" comment="libreoffice-gnome-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100302" comment="libreoffice-icon-themes-prebuilt-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100303" comment="libreoffice-impress-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100304" comment="libreoffice-impress-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100305" comment="libreoffice-kde-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100306" comment="libreoffice-kde4-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100307" comment="libreoffice-l10n-prebuilt-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100308" comment="libreoffice-mailmerge-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100309" comment="libreoffice-math-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100310" comment="libreoffice-officebean-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100311" comment="libreoffice-pyuno-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100312" comment="libreoffice-sdk-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100313" comment="libreoffice-sdk-doc-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100314" comment="libreoffice-writer-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100315" comment="libreoffice-writer-extensions-3.6.3.2.4-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4159</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4159" source="CVE"/>
    <description>
    ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096913" comment="ctdb-2.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096914" comment="ctdb-devel-2.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096915" comment="ctdb-pcp-pmda-2.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4162</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162" source="CVE"/>
    <description>
    The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4164</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164" source="CVE"/>
    <description>
    Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091813" comment="ruby19-1.9.3.p392-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091814" comment="ruby19-devel-1.9.3.p392-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091815" comment="ruby19-devel-extra-1.9.3.p392-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091816" comment="ruby19-doc-ri-1.9.3.p392-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091817" comment="ruby19-tk-1.9.3.p392-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4206</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4206" source="CVE"/>
    <description>
    Heap-based buffer underflow in the modmul function in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code execution via a crafted DSA signature, which is not properly handled when performing certain bit-shifting operations during modular multiplication.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090222" comment="filezilla-3.7.3-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090225" comment="filezilla-lang-3.7.3-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4207</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4207" source="CVE"/>
    <description>
    Buffer overflow in sshbn.c in PuTTY before 0.63 allows remote SSH servers to cause a denial of service (crash) via an invalid DSA signature that is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality, a different vulnerability than CVE-2013-4206.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090222" comment="filezilla-3.7.3-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090225" comment="filezilla-lang-3.7.3-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4208</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4208" source="CVE"/>
    <description>
    The rsa_verify function in PuTTY before 0.63 (1) does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory, which might allow local users to discover private RSA and DSA keys.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090222" comment="filezilla-3.7.3-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090225" comment="filezilla-lang-3.7.3-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4231</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" source="CVE"/>
    <description>
    Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090707" comment="libtiff-devel-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090708" comment="libtiff-devel-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090709" comment="libtiff5-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090710" comment="libtiff5-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090713" comment="tiff-4.0.3-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4232</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" source="CVE"/>
    <description>
    Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted TIFF image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090707" comment="libtiff-devel-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090708" comment="libtiff-devel-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090709" comment="libtiff5-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090710" comment="libtiff5-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090713" comment="tiff-4.0.3-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4233</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4233" source="CVE"/>
    <description>
    Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091252" comment="libmodplug-0.8.8.4-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091253" comment="libmodplug-devel-0.8.8.4-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091254" comment="libmodplug1-0.8.8.4-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091255" comment="libmodplug1-32bit-0.8.8.4-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4234</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4234" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091252" comment="libmodplug-0.8.8.4-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091253" comment="libmodplug-devel-0.8.8.4-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091254" comment="libmodplug1-0.8.8.4-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091255" comment="libmodplug1-32bit-0.8.8.4-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4237</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" source="CVE"/>
    <description>
    sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090796" comment="glibc-testsuite-2.17-4.7.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090797" comment="glibc-utils-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090798" comment="glibc-utils-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090802" comment="glibc-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090803" comment="glibc-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090807" comment="glibc-devel-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090808" comment="glibc-devel-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090811" comment="glibc-devel-static-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090812" comment="glibc-devel-static-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090813" comment="glibc-extra-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090815" comment="glibc-i18ndata-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090816" comment="glibc-info-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090817" comment="glibc-locale-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090818" comment="glibc-locale-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090821" comment="glibc-obsolete-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090823" comment="glibc-profile-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090824" comment="glibc-profile-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090825" comment="nscd-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090827" comment="glibc-html-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090828" comment="glibc-testsuite-2.17-4.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4238</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238" source="CVE"/>
    <description>
    The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090472" comment="libpython2_7-1_0-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090473" comment="libpython2_7-1_0-32bit-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090476" comment="python-base-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090477" comment="python-base-32bit-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090481" comment="python-devel-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090482" comment="python-xml-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090484" comment="python-doc-2.7-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090485" comment="python-doc-pdf-2.7-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090486" comment="python-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090487" comment="python-32bit-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090488" comment="python-curses-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090493" comment="python-demo-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090494" comment="python-gdbm-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090496" comment="python-idle-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090497" comment="python-tk-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090499" comment="libpython3_3m1_0-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090500" comment="libpython3_3m1_0-32bit-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090503" comment="python3-base-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090504" comment="python3-base-32bit-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090508" comment="python3-devel-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090510" comment="python3-idle-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090511" comment="python3-testsuite-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090513" comment="python3-tools-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090514" comment="python3-doc-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090515" comment="python3-doc-pdf-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090516" comment="python3-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090517" comment="python3-32bit-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090518" comment="python3-curses-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090520" comment="python3-dbm-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090525" comment="python3-tk-3.3.0-6.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4243</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" source="CVE"/>
    <description>
    Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090707" comment="libtiff-devel-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090708" comment="libtiff-devel-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090709" comment="libtiff5-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090710" comment="libtiff5-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090713" comment="tiff-4.0.3-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4244</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" source="CVE"/>
    <description>
    The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090707" comment="libtiff-devel-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090708" comment="libtiff-devel-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090709" comment="libtiff5-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090710" comment="libtiff5-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090713" comment="tiff-4.0.3-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4248</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248" source="CVE"/>
    <description>
    The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092421" comment="apache2-mod_php5-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092422" comment="php5-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092423" comment="php5-bcmath-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092424" comment="php5-bz2-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092425" comment="php5-calendar-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092426" comment="php5-ctype-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092427" comment="php5-curl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092428" comment="php5-dba-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092429" comment="php5-devel-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092430" comment="php5-dom-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092431" comment="php5-enchant-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092432" comment="php5-exif-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092433" comment="php5-fastcgi-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092434" comment="php5-fileinfo-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092435" comment="php5-fpm-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092436" comment="php5-ftp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092437" comment="php5-gd-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092438" comment="php5-gettext-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092439" comment="php5-gmp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092440" comment="php5-iconv-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092441" comment="php5-imap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092442" comment="php5-intl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092443" comment="php5-json-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092444" comment="php5-ldap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092445" comment="php5-mbstring-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092446" comment="php5-mcrypt-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092447" comment="php5-mssql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092448" comment="php5-mysql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092449" comment="php5-odbc-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092450" comment="php5-openssl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092451" comment="php5-pcntl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092452" comment="php5-pdo-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092453" comment="php5-pear-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092454" comment="php5-pgsql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092455" comment="php5-phar-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092456" comment="php5-posix-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092457" comment="php5-pspell-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092458" comment="php5-readline-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092459" comment="php5-shmop-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092460" comment="php5-snmp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092461" comment="php5-soap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092462" comment="php5-sockets-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092463" comment="php5-sqlite-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092464" comment="php5-suhosin-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092465" comment="php5-sysvmsg-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092466" comment="php5-sysvsem-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092467" comment="php5-sysvshm-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092468" comment="php5-tidy-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092469" comment="php5-tokenizer-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092470" comment="php5-wddx-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092471" comment="php5-xmlreader-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092472" comment="php5-xmlrpc-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092473" comment="php5-xmlwriter-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092474" comment="php5-xsl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092475" comment="php5-zip-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092476" comment="php5-zlib-5.3.17-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4254</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4254" source="CVE"/>
    <description>
    The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4276</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in LittleCMS (aka lcms or liblcms) 1.19 and earlier allow remote attackers to cause a denial of service (crash) via a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091016" comment="lcms-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091017" comment="liblcms-devel-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091018" comment="liblcms-devel-32bit-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091019" comment="liblcms1-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091020" comment="liblcms1-32bit-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091021" comment="python-lcms-1.19-11.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4277</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277" source="CVE"/>
    <description>
    Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090530" comment="libsvn_auth_gnome_keyring-1-0-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090532" comment="libsvn_auth_kwallet-1-0-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090534" comment="subversion-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090535" comment="subversion-bash-completion-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090538" comment="subversion-devel-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090539" comment="subversion-perl-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090541" comment="subversion-python-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090543" comment="subversion-server-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090545" comment="subversion-tools-1.7.13-2.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4287</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091135" comment="ruby19-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091136" comment="ruby19-devel-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091137" comment="ruby19-devel-extra-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091138" comment="ruby19-doc-ri-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091139" comment="ruby19-tk-1.9.3.p392-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4288</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288" source="CVE"/>
    <description>
    Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090930" comment="libudev-mini-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090931" comment="libudev-mini1-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090932" comment="systemd-mini-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090933" comment="systemd-mini-analyze-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090934" comment="systemd-mini-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090935" comment="systemd-mini-sysvinit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090936" comment="udev-mini-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090937" comment="libgudev-1_0-0-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090938" comment="libgudev-1_0-0-32bit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090939" comment="libgudev-1_0-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090940" comment="libudev-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090941" comment="libudev1-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090942" comment="libudev1-32bit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090943" comment="systemd-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090944" comment="systemd-32bit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090945" comment="systemd-analyze-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090946" comment="systemd-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090947" comment="systemd-logger-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090948" comment="systemd-sysvinit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090949" comment="typelib-1_0-GUdev-1_0-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090950" comment="udev-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091148" comment="hplip-3.12.11-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091149" comment="hplip-hpijs-3.12.11-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091150" comment="hplip-sane-3.12.11-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4296</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296" source="CVE"/>
    <description>
    The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091032" comment="libvirt-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091033" comment="libvirt-client-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091034" comment="libvirt-client-32bit-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091035" comment="libvirt-devel-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091036" comment="libvirt-devel-32bit-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091037" comment="libvirt-doc-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091038" comment="libvirt-lock-sanlock-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091039" comment="libvirt-python-1.0.2-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4311</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311" source="CVE"/>
    <description>
    libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091032" comment="libvirt-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091033" comment="libvirt-client-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091034" comment="libvirt-client-32bit-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091035" comment="libvirt-devel-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091036" comment="libvirt-devel-32bit-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091037" comment="libvirt-doc-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091038" comment="libvirt-lock-sanlock-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091039" comment="libvirt-python-1.0.2-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4314</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4314" source="CVE"/>
    <description>
    The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091315" comment="python-pyOpenSSL-doc-0.13.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091316" comment="python-pyOpenSSL-0.13.1-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4324</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4324" source="CVE"/>
    <description>
    spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091097" comment="libspice-client-glib-2_0-8-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091098" comment="libspice-client-gtk-2_0-4-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091099" comment="libspice-client-gtk-3_0-4-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091100" comment="libspice-controller0-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091101" comment="python-SpiceClientGtk-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091102" comment="spice-gtk-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091103" comment="spice-gtk-devel-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091104" comment="spice-gtk-lang-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091105" comment="typelib-1_0-SpiceClientGlib-2_0-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091106" comment="typelib-1_0-SpiceClientGtk-2_0-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091107" comment="typelib-1_0-SpiceClientGtk-3_0-0.14-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4325</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" source="CVE"/>
    <description>
    The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091148" comment="hplip-3.12.11-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091149" comment="hplip-hpijs-3.12.11-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091150" comment="hplip-sane-3.12.11-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4326</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4326" source="CVE"/>
    <description>
    RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091015" comment="rtkit-0.11_git201205151338-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4332</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" source="CVE"/>
    <description>
    Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090796" comment="glibc-testsuite-2.17-4.7.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090797" comment="glibc-utils-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090798" comment="glibc-utils-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090802" comment="glibc-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090803" comment="glibc-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090807" comment="glibc-devel-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090808" comment="glibc-devel-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090811" comment="glibc-devel-static-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090812" comment="glibc-devel-static-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090813" comment="glibc-extra-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090815" comment="glibc-i18ndata-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090816" comment="glibc-info-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090817" comment="glibc-locale-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090818" comment="glibc-locale-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090821" comment="glibc-obsolete-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090823" comment="glibc-profile-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090824" comment="glibc-profile-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090825" comment="nscd-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090827" comment="glibc-html-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090828" comment="glibc-testsuite-2.17-4.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4342</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342" source="CVE"/>
    <description>
    xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094904" comment="xinetd-2.3.14-163.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4344</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344" source="CVE"/>
    <description>
    Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093291" comment="qemu-1.3.1-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093292" comment="qemu-guest-agent-1.3.1-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093293" comment="qemu-linux-user-1.3.1-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093294" comment="qemu-tools-1.3.1-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4348</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4348" source="CVE"/>
    <description>
    The skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel through 3.12 allows remote attackers to cause a denial of service (infinite loop) via a small value in the IHL field of a packet with IPIP encapsulation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4349</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4349" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-4540.  Reason: This candidate was MERGED into CVE-2012-4540, since it was later discovered that it affected an additional version, but it does not constitute a regression error.  Notes: All CVE users should reference CVE-2012-4540 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090829" comment="icedtea-web-1.4.1-4.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090832" comment="icedtea-web-javadoc-1.4.1-4.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4351</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351" source="CVE"/>
    <description>
    GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090760" comment="gpg2-2.0.19-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090763" comment="gpg2-lang-2.0.19-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4353</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353" source="CVE"/>
    <description>
    The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093021" comment="libopenssl-devel-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093022" comment="libopenssl-devel-32bit-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093023" comment="libopenssl1_0_0-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093024" comment="libopenssl1_0_0-32bit-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093025" comment="openssl-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093026" comment="openssl-doc-1.0.1e-1.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4355</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" source="CVE"/>
    <description>
    Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4359</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4359" source="CVE"/>
    <description>
    Integer overflow in kbdint.c in mod_sftp in ProFTPD 1.3.4d and 1.3.5r3 allows remote attackers to cause a denial of service (memory consumption) via a large response count value in an authentication request, which triggers a large memory allocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091088" comment="proftpd-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091089" comment="proftpd-devel-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091090" comment="proftpd-doc-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091091" comment="proftpd-lang-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091092" comment="proftpd-ldap-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091093" comment="proftpd-mysql-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091094" comment="proftpd-pgsql-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091095" comment="proftpd-radius-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091096" comment="proftpd-sqlite-1.3.4d-4.4.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4361</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" source="CVE"/>
    <description>
    The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4363</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.  NOTE: this issue is due to an incomplete fix for CVE-2013-4287.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091135" comment="ruby19-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091136" comment="ruby19-devel-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091137" comment="ruby19-devel-extra-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091138" comment="ruby19-doc-ri-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091139" comment="ruby19-tk-1.9.3.p392-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4365</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4365" source="CVE"/>
    <description>
    Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.9 for the Apache HTTP Server allows remote attackers to have an unspecified impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091143" comment="apache2-mod_fcgid-2.3.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091353" comment="apache2-mod_fcgid-2.3.6-11.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4368</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" source="CVE"/>
    <description>
    The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4369</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369" source="CVE"/>
    <description>
    The xlu_vif_parse_rate function in the libxlu library in Xen 4.2.x and 4.3.x allows local users to cause a denial of service (NULL pointer dereference) by using the "@" character as the VIF rate configuration.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4370</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370" source="CVE"/>
    <description>
    The ocaml binding for the xc_vcpu_getaffinity function in Xen 4.2.x and 4.3.x frees certain memory that may still be intended for use, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors that trigger a (1) use-after-free or (2) double free.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4371</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371" source="CVE"/>
    <description>
    Use-after-free vulnerability in the libxl_list_cpupool function in the libxl toolstack library in Xen 4.2.x and 4.3.x, when running "under memory pressure," returns the original pointer when the realloc function fails, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4375</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375" source="CVE"/>
    <description>
    The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4389</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092220" comment="rubygem-activesupport-3_2-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092221" comment="rubygem-activesupport-3_2-doc-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092222" comment="rubygem-actionmailer-3_2-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092223" comment="rubygem-actionmailer-3_2-doc-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092537" comment="rubygem-actionpack-3_2-3.2.12-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092538" comment="rubygem-actionpack-3_2-doc-3.2.12-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4396</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396" source="CVE"/>
    <description>
    Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091140" comment="xorg-x11-server-7.6_1.13.2-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091141" comment="xorg-x11-server-extra-7.6_1.13.2-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091142" comment="xorg-x11-server-sdk-7.6_1.13.2-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4402</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402" source="CVE"/>
    <description>
    The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091022" comment="gpg2-2.0.19-5.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091023" comment="gpg2-lang-2.0.19-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4407</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4407" source="CVE"/>
    <description>
    HTTP::Body::Multipart in the HTTP-Body 1.08, 1.17, and earlier module for Perl uses the part of the uploaded file's name after the first "." character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094469" comment="perl-HTTP-Body-1.19-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4408</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094251" comment="samba-doc-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094252" comment="libnetapi-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094253" comment="libnetapi0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094254" comment="libsmbclient-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094255" comment="libsmbclient0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094256" comment="libsmbclient0-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094257" comment="libsmbsharemodes-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094258" comment="libsmbsharemodes0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094259" comment="libwbclient-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094260" comment="libwbclient0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094261" comment="libwbclient0-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094262" comment="samba-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094263" comment="samba-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094264" comment="samba-client-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094265" comment="samba-client-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094266" comment="samba-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094267" comment="samba-krb-printing-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094268" comment="samba-winbind-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094269" comment="samba-winbind-32bit-3.6.12-59.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4416</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416" source="CVE"/>
    <description>
    The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4421</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4421" source="CVE"/>
    <description>
    The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091147" comment="dropbear-2013.60-7.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4434</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4434" source="CVE"/>
    <description>
    Dropbear SSH Server before 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote attackers to discover valid usernames.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091147" comment="dropbear-2013.60-7.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4450</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4450" source="CVE"/>
    <description>
    The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091908" comment="nodejs-0.8.12-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091909" comment="nodejs-devel-0.8.12-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4475</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" source="CVE"/>
    <description>
    Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091727" comment="samba-doc-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091728" comment="libnetapi-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091729" comment="libnetapi0-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091730" comment="libsmbclient-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091731" comment="libsmbclient0-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091732" comment="libsmbclient0-32bit-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091733" comment="libsmbsharemodes-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091734" comment="libsmbsharemodes0-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091735" comment="libwbclient-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091736" comment="libwbclient0-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091737" comment="libwbclient0-32bit-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091738" comment="samba-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091739" comment="samba-32bit-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091740" comment="samba-client-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091741" comment="samba-client-32bit-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091742" comment="samba-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091743" comment="samba-krb-printing-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091744" comment="samba-winbind-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091745" comment="samba-winbind-32bit-3.6.12-59.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4484</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4484" source="CVE"/>
    <description>
    Varnish before 3.0.5 allows remote attackers to cause a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091419" comment="libvarnishapi1-3.0.3-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091420" comment="varnish-3.0.3-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091421" comment="varnish-devel-3.0.3-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4491</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4491" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092082" comment="rubygem-actionpack-3_2-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092083" comment="rubygem-actionpack-3_2-doc-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092537" comment="rubygem-actionpack-3_2-3.2.12-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092538" comment="rubygem-actionpack-3_2-doc-3.2.12-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4492</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4492" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092214" comment="rubygem-i18n-0.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092215" comment="rubygem-i18n-doc-0.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092216" comment="rubygem-i18n-testsuite-0.6.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4494</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" source="CVE"/>
    <description>
    Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4496</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" source="CVE"/>
    <description>
    Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094251" comment="samba-doc-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094252" comment="libnetapi-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094253" comment="libnetapi0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094254" comment="libsmbclient-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094255" comment="libsmbclient0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094256" comment="libsmbclient0-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094257" comment="libsmbsharemodes-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094258" comment="libsmbsharemodes0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094259" comment="libwbclient-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094260" comment="libwbclient0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094261" comment="libwbclient0-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094262" comment="samba-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094263" comment="samba-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094264" comment="samba-client-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094265" comment="samba-client-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094266" comment="samba-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094267" comment="samba-krb-printing-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094268" comment="samba-winbind-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094269" comment="samba-winbind-32bit-3.6.12-59.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4505</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505" source="CVE"/>
    <description>
    The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091895" comment="libsvn_auth_gnome_keyring-1-0-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091896" comment="libsvn_auth_kwallet-1-0-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091897" comment="subversion-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091898" comment="subversion-bash-completion-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091899" comment="subversion-devel-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091900" comment="subversion-perl-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091901" comment="subversion-python-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091902" comment="subversion-server-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091903" comment="subversion-tools-1.7.14-2.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4508</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4508" source="CVE"/>
    <description>
    lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092927" comment="lighttpd-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092928" comment="lighttpd-mod_cml-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092929" comment="lighttpd-mod_geoip-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092930" comment="lighttpd-mod_magnet-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092931" comment="lighttpd-mod_mysql_vhost-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092932" comment="lighttpd-mod_rrdtool-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092933" comment="lighttpd-mod_trigger_b4_dl-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092934" comment="lighttpd-mod_webdav-1.4.31-6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4511</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4511" source="CVE"/>
    <description>
    Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4513</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4513" source="CVE"/>
    <description>
    Buffer overflow in the oz_cdev_write function in drivers/staging/ozwpan/ozcdev.c in the Linux kernel before 3.12 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted write operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4514</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4514" source="CVE"/>
    <description>
    Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4515</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4515" source="CVE"/>
    <description>
    The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4540</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540" source="CVE"/>
    <description>
    Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4545</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545" source="CVE"/>
    <description>
    cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091904" comment="curl-7.28.1-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091905" comment="libcurl-devel-7.28.1-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091906" comment="libcurl4-32bit-7.28.1-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091907" comment="libcurl4-7.28.1-4.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4547</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547" source="CVE"/>
    <description>
    nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091594" comment="nginx-1.2.9-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4549</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549" source="CVE"/>
    <description>
    QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092935" comment="libqt4-devel-doc-4.8.4-3.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092936" comment="libqt4-devel-doc-data-4.8.4-3.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092937" comment="qt4-x11-tools-4.8.4-3.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092938" comment="libqt4-sql-mysql-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092939" comment="libqt4-sql-mysql-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092940" comment="libqt4-sql-plugins-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092941" comment="libqt4-sql-postgresql-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092942" comment="libqt4-sql-postgresql-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092943" comment="libqt4-sql-unixODBC-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092944" comment="libqt4-sql-unixODBC-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092945" comment="libqt4-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092946" comment="libqt4-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092947" comment="libqt4-devel-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092948" comment="libqt4-private-headers-devel-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092949" comment="libqt4-qt3support-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092950" comment="libqt4-qt3support-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092951" comment="libqt4-sql-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092952" comment="libqt4-sql-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092953" comment="libqt4-sql-sqlite-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092954" comment="libqt4-sql-sqlite-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092955" comment="libqt4-x11-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092956" comment="libqt4-x11-4.8.4-3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4551</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551" source="CVE"/>
    <description>
    Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4553</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" source="CVE"/>
    <description>
    The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4554</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554" source="CVE"/>
    <description>
    Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4558</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558" source="CVE"/>
    <description>
    The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091895" comment="libsvn_auth_gnome_keyring-1-0-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091896" comment="libsvn_auth_kwallet-1-0-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091897" comment="subversion-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091898" comment="subversion-bash-completion-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091899" comment="subversion-devel-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091900" comment="subversion-perl-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091901" comment="subversion-python-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091902" comment="subversion-server-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091903" comment="subversion-tools-1.7.14-2.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4559</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4559" source="CVE"/>
    <description>
    lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092927" comment="lighttpd-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092928" comment="lighttpd-mod_cml-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092929" comment="lighttpd-mod_geoip-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092930" comment="lighttpd-mod_magnet-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092931" comment="lighttpd-mod_mysql_vhost-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092932" comment="lighttpd-mod_rrdtool-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092933" comment="lighttpd-mod_trigger_b4_dl-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092934" comment="lighttpd-mod_webdav-1.4.31-6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4560</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4560" source="CVE"/>
    <description>
    Use-after-free vulnerability in lighttpd before 1.4.33 allows remote attackers to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092927" comment="lighttpd-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092928" comment="lighttpd-mod_cml-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092929" comment="lighttpd-mod_geoip-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092930" comment="lighttpd-mod_magnet-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092931" comment="lighttpd-mod_mysql_vhost-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092932" comment="lighttpd-mod_rrdtool-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092933" comment="lighttpd-mod_trigger_b4_dl-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092934" comment="lighttpd-mod_webdav-1.4.31-6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4579</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4579" source="CVE"/>
    <description>
    The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4587</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587" source="CVE"/>
    <description>
    Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4635</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4635" source="CVE"/>
    <description>
    Integer overflow in the SdnToJewish function in jewish.c in the Calendar component in PHP before 5.3.26 and 5.4.x before 5.4.16 allows context-dependent attackers to cause a denial of service (application hang) via a large argument to the jdtojewish function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083036" comment="apache2-mod_php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083038" comment="php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083039" comment="php5-bcmath-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083041" comment="php5-bz2-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083043" comment="php5-calendar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083045" comment="php5-ctype-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083047" comment="php5-curl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083049" comment="php5-dba-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083053" comment="php5-devel-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083054" comment="php5-dom-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083056" comment="php5-enchant-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083058" comment="php5-exif-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083060" comment="php5-fastcgi-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083062" comment="php5-fileinfo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083064" comment="php5-fpm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083066" comment="php5-ftp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083068" comment="php5-gd-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083070" comment="php5-gettext-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083072" comment="php5-gmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083074" comment="php5-iconv-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083076" comment="php5-imap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083078" comment="php5-intl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083080" comment="php5-json-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083082" comment="php5-ldap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083084" comment="php5-mbstring-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083086" comment="php5-mcrypt-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083088" comment="php5-mssql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083090" comment="php5-mysql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083092" comment="php5-odbc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083094" comment="php5-openssl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083096" comment="php5-pcntl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083098" comment="php5-pdo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083100" comment="php5-pear-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083101" comment="php5-pgsql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083103" comment="php5-phar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083105" comment="php5-posix-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083107" comment="php5-pspell-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083109" comment="php5-readline-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083111" comment="php5-shmop-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083113" comment="php5-snmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083115" comment="php5-soap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083117" comment="php5-sockets-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083119" comment="php5-sqlite-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083121" comment="php5-suhosin-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083123" comment="php5-sysvmsg-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083125" comment="php5-sysvsem-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083127" comment="php5-sysvshm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083129" comment="php5-tidy-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083131" comment="php5-tokenizer-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083133" comment="php5-wddx-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083135" comment="php5-xmlreader-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083137" comment="php5-xmlrpc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083139" comment="php5-xmlwriter-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083141" comment="php5-xsl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083143" comment="php5-zip-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083145" comment="php5-zlib-5.3.17-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4668</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4668" source="CVE"/>
    <description>
    Directory traversal vulnerability in File Roller 3.6.x before 3.6.4, 3.8.x before 3.8.3, and 3.9.x before 3.9.3, when libarchive is used, allows remote attackers to create arbitrary files via a crafted archive that is not properly handled in a "Keep directory structure" action, related to fr-archive-libarchive.c and fr-window.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083174" comment="file-roller-3.6.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083177" comment="file-roller-lang-3.6.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083178" comment="nautilus-file-roller-3.6.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4717</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4717" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089981" comment="otrs-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089982" comment="otrs-doc-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089983" comment="otrs-itsm-3.1.10-26.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4718</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4718" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089981" comment="otrs-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089982" comment="otrs-doc-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089983" comment="otrs-itsm-3.1.10-26.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4852</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4852" source="CVE"/>
    <description>
    Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090222" comment="filezilla-3.7.3-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090225" comment="filezilla-lang-3.7.3-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090259" comment="putty-0.63-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4854</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854" source="CVE"/>
    <description>
    The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090245" comment="bind-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090246" comment="bind-chrootenv-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090249" comment="bind-devel-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090250" comment="bind-doc-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090251" comment="bind-libs-32bit-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090252" comment="bind-libs-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090255" comment="bind-lwresd-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090257" comment="bind-utils-9.9.3P2-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4885</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4885" source="CVE"/>
    <description>
    The http-domino-enum-passwords.nse script in NMap before 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091063" comment="ncat-6.25-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091064" comment="ndiff-6.25-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091065" comment="nmap-6.25-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091066" comment="nping-6.25-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091067" comment="zenmap-6.25-3.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4927</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927" source="CVE"/>
    <description>
    Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083217" comment="wireshark-1.8.9-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083220" comment="wireshark-devel-1.8.9-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4929</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4929" source="CVE"/>
    <description>
    The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083217" comment="wireshark-1.8.9-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083220" comment="wireshark-devel-1.8.9-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4930</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" source="CVE"/>
    <description>
    The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083217" comment="wireshark-1.8.9-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083220" comment="wireshark-devel-1.8.9-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4931</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083217" comment="wireshark-1.8.9-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083220" comment="wireshark-devel-1.8.9-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4932</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" source="CVE"/>
    <description>
    Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083217" comment="wireshark-1.8.9-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083220" comment="wireshark-devel-1.8.9-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4933</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083217" comment="wireshark-1.8.9-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083220" comment="wireshark-devel-1.8.9-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4934</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083217" comment="wireshark-1.8.9-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083220" comment="wireshark-devel-1.8.9-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4935</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-4935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" source="CVE"/>
    <description>
    The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083217" comment="wireshark-1.8.9-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083220" comment="wireshark-devel-1.8.9-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5018</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018" source="CVE"/>
    <description>
    The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090031" comment="strongswan-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090033" comment="strongswan-doc-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090034" comment="strongswan-ipsec-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090036" comment="strongswan-libs0-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090038" comment="strongswan-mysql-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090040" comment="strongswan-nm-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090042" comment="strongswan-sqlite-5.0.1-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5029</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5029" source="CVE"/>
    <description>
    phpMyAdmin 3.5.x and 4.0.x before 4.0.5 allows remote attackers to bypass the clickjacking protection mechanism via certain vectors related to Header.class.php.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090046" comment="phpMyAdmin-4.0.5-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5211</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211" source="CVE"/>
    <description>
    The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099112" comment="ntp-4.2.6p5-9.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099113" comment="ntp-doc-4.2.6p5-9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5588</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5588" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the step parameter to install/index.php or (2) the id parameter to cacti/host.php.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095356" comment="cacti-spine-0.8.8b-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095357" comment="cacti-0.8.8b-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5589</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5589" source="CVE"/>
    <description>
    SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095356" comment="cacti-spine-0.8.8b-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095357" comment="cacti-0.8.8b-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5590</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5591</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5592</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5593</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593" source="CVE"/>
    <description>
    The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5595</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5596</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596" source="CVE"/>
    <description>
    The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5597</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5598</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598" source="CVE"/>
    <description>
    PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRAME element, which allows remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges by using this element within an embedded PDF object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5599</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5600</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5601</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5602</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" source="CVE"/>
    <description>
    The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5603</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5604</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" source="CVE"/>
    <description>
    The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5605</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091465" comment="mozilla-nspr-32bit-4.10.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091466" comment="mozilla-nspr-4.10.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091467" comment="mozilla-nspr-devel-4.10.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091468" comment="libfreebl3-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091469" comment="libfreebl3-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091470" comment="libsoftokn3-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091471" comment="libsoftokn3-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091472" comment="mozilla-nss-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091473" comment="mozilla-nss-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091474" comment="mozilla-nss-certs-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091475" comment="mozilla-nss-certs-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091476" comment="mozilla-nss-devel-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091477" comment="mozilla-nss-sysinit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091478" comment="mozilla-nss-sysinit-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091479" comment="mozilla-nss-tools-3.15.3-1.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5609</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5610</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5611</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5612</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5613</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5614</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5615</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" source="CVE"/>
    <description>
    The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5616</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5618</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5619</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" source="CVE"/>
    <description>
    Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5645</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5645" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Roundcube webmail before 0.9.3 allow user-assisted remote attackers to inject arbitrary web script or HTML via the body of a message visited in (1) new or (2) draft mode, related to compose.inc; and (3) might allow remote authenticated users to inject arbitrary web script or HTML via an HTML signature, related to save_identity.inc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090385" comment="roundcubemail-0.9.3-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5651</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5651" source="CVE"/>
    <description>
    The virBitmapParse function in util/virbitmap.c in libvirt before 1.1.2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a crafted bitmap, as demonstrated by a large nodeset value to numatune.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091032" comment="libvirt-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091033" comment="libvirt-client-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091034" comment="libvirt-client-32bit-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091035" comment="libvirt-devel-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091036" comment="libvirt-devel-32bit-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091037" comment="libvirt-doc-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091038" comment="libvirt-lock-sanlock-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091039" comment="libvirt-python-1.0.2-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5704</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704" source="CVE"/>
    <description>
    The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding.  NOTE: the vendor states "this is not a security issue in httpd as such."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103254" comment="apache2-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103255" comment="apache2-devel-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103256" comment="apache2-doc-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103257" comment="apache2-event-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103258" comment="apache2-example-pages-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103259" comment="apache2-itk-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103260" comment="apache2-prefork-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103261" comment="apache2-utils-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103262" comment="apache2-worker-2.2.29-10.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5705</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5705" source="CVE"/>
    <description>
    apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099588" comment="apache2-mod_security2-2.7.5-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5718</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718" source="CVE"/>
    <description>
    The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not restrict the dch_id value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090703" comment="wireshark-1.8.10-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090706" comment="wireshark-devel-1.8.10-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5719</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719" source="CVE"/>
    <description>
    epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090703" comment="wireshark-1.8.10-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090706" comment="wireshark-devel-1.8.10-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5720</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720" source="CVE"/>
    <description>
    Buffer overflow in the RTPS dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090703" comment="wireshark-1.8.10-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090706" comment="wireshark-devel-1.8.10-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5721</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721" source="CVE"/>
    <description>
    The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090703" comment="wireshark-1.8.10-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090706" comment="wireshark-devel-1.8.10-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5722</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722" source="CVE"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090703" comment="wireshark-1.8.10-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090706" comment="wireshark-devel-1.8.10-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5772</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and earlier and Java SE 6u60 and earlier allows remote attackers to affect integrity via unknown vectors related to jhat.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5774</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5778</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5780</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5782</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5783</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Swing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5784</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to SCRIPTING.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5790</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to BEANS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5797</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and JavaFX 2.2.40 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5800</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5802</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5803</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5804</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, and JRockit R27.7.6 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Javadoc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5805</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5805" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5806.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5806</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5806" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5805.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5809</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5814</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5817</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5820</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to JAX-WS.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5823</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5825</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JAXP.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5829</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5830</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5840</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5842</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5849</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to AWT.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5850</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5851</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5878</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5878" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the the Security component does not properly handle null XML namespace (xmlns) attributes during XML document canonicalization, which allows attackers to escape the sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5884</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5884" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an incorrect check for code permissions by CORBA stub factories.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5893</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5893" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u45 and Java SE Embedded 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to improper handling of methods in MethodHandles in HotSpot JVM, which allows attackers to escape the sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5896</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5896" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that com.sun.corba.se and its sub-packages are not included on the restricted package list.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5907</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5910</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-5910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5910" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that CanonicalizerBase.java in the XML canonicalizer allows untrusted code to access mutable byte arrays.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6075</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6075" source="CVE"/>
    <description>
    The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091320" comment="strongswan-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091321" comment="strongswan-doc-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091322" comment="strongswan-ipsec-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091323" comment="strongswan-libs0-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091324" comment="strongswan-mysql-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091325" comment="strongswan-nm-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091326" comment="strongswan-sqlite-5.0.1-4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6172</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6172" source="CVE"/>
    <description>
    steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094428" comment="php5-pear-Net_IDNA2-0.1.1-5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094429" comment="roundcubemail-0.9.5-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6336</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" source="CVE"/>
    <description>
    The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091361" comment="wireshark-1.8.11-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091362" comment="wireshark-devel-1.8.11-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6337</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" source="CVE"/>
    <description>
    Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091361" comment="wireshark-1.8.11-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091362" comment="wireshark-devel-1.8.11-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6338</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091361" comment="wireshark-1.8.11-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091362" comment="wireshark-devel-1.8.11-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6339</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" source="CVE"/>
    <description>
    The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091361" comment="wireshark-1.8.11-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091362" comment="wireshark-devel-1.8.11-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6340</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" source="CVE"/>
    <description>
    epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091361" comment="wireshark-1.8.11-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091362" comment="wireshark-devel-1.8.11-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6367</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367" source="CVE"/>
    <description>
    The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6368</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368" source="CVE"/>
    <description>
    The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6369</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6369" source="CVE"/>
    <description>
    Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099285" comment="jbigkit-2.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099286" comment="libjbig-devel-2.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099287" comment="libjbig-devel-32bit-2.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099288" comment="libjbig2-2.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099289" comment="libjbig2-32bit-2.0-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6370</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6370" source="CVE"/>
    <description>
    Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095137" comment="json-c-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095138" comment="libjson-devel-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095139" comment="libjson-doc-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095140" comment="libjson0-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095141" comment="libjson0-32bit-0.9-13.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6371</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6371" source="CVE"/>
    <description>
    The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095137" comment="json-c-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095138" comment="libjson-devel-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095139" comment="libjson-doc-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095140" comment="libjson0-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095141" comment="libjson0-32bit-0.9-13.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6376</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6376" source="CVE"/>
    <description>
    The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6378</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378" source="CVE"/>
    <description>
    The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6380</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6380" source="CVE"/>
    <description>
    The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6393</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6393" source="CVE"/>
    <description>
    The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093545" comment="libyaml-0-2-0.1.3-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093546" comment="libyaml-0.1.3-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093547" comment="libyaml-devel-0.1.3-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094186" comment="libyaml-0-2-0.1.3-11.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094187" comment="libyaml-0.1.3-11.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094188" comment="libyaml-devel-0.1.3-11.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6400</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400" source="CVE"/>
    <description>
    Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6401</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6401" source="CVE"/>
    <description>
    Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094236" comment="libjansson-2.3.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094237" comment="libjansson-devel-2.3.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094238" comment="libjansson4-2.3.1-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6402</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" source="CVE"/>
    <description>
    base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.11 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hp-pkservice.log temporary file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093074" comment="hplip-3.12.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093075" comment="hplip-hpijs-3.12.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093076" comment="hplip-sane-3.12.11-2.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6411</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6411" source="CVE"/>
    <description>
    The HandleCrashedAircraft function in aircraft_cmd.cpp in OpenTTD 0.3.6 through 1.3.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) by crashing an aircraft outside of the map.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092217" comment="openttd-1.3.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092218" comment="openttd-data-1.3.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092219" comment="openttd-dedicated-1.3.3-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6414</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414" source="CVE"/>
    <description>
    actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092082" comment="rubygem-actionpack-3_2-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092083" comment="rubygem-actionpack-3_2-doc-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092537" comment="rubygem-actionpack-3_2-3.2.12-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092538" comment="rubygem-actionpack-3_2-doc-3.2.12-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6415</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the number_to_currency helper in actionpack/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092082" comment="rubygem-actionpack-3_2-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092083" comment="rubygem-actionpack-3_2-doc-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092537" comment="rubygem-actionpack-3_2-3.2.12-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092538" comment="rubygem-actionpack-3_2-doc-3.2.12-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6417</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6417" source="CVE"/>
    <description>
    actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092082" comment="rubygem-actionpack-3_2-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092083" comment="rubygem-actionpack-3_2-doc-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092537" comment="rubygem-actionpack-3_2-3.2.12-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092538" comment="rubygem-actionpack-3_2-doc-3.2.12-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6420</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420" source="CVE"/>
    <description>
    The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092421" comment="apache2-mod_php5-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092422" comment="php5-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092423" comment="php5-bcmath-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092424" comment="php5-bz2-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092425" comment="php5-calendar-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092426" comment="php5-ctype-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092427" comment="php5-curl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092428" comment="php5-dba-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092429" comment="php5-devel-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092430" comment="php5-dom-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092431" comment="php5-enchant-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092432" comment="php5-exif-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092433" comment="php5-fastcgi-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092434" comment="php5-fileinfo-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092435" comment="php5-fpm-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092436" comment="php5-ftp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092437" comment="php5-gd-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092438" comment="php5-gettext-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092439" comment="php5-gmp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092440" comment="php5-iconv-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092441" comment="php5-imap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092442" comment="php5-intl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092443" comment="php5-json-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092444" comment="php5-ldap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092445" comment="php5-mbstring-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092446" comment="php5-mcrypt-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092447" comment="php5-mssql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092448" comment="php5-mysql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092449" comment="php5-odbc-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092450" comment="php5-openssl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092451" comment="php5-pcntl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092452" comment="php5-pdo-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092453" comment="php5-pear-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092454" comment="php5-pgsql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092455" comment="php5-phar-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092456" comment="php5-posix-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092457" comment="php5-pspell-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092458" comment="php5-readline-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092459" comment="php5-shmop-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092460" comment="php5-snmp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092461" comment="php5-soap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092462" comment="php5-sockets-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092463" comment="php5-sqlite-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092464" comment="php5-suhosin-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092465" comment="php5-sysvmsg-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092466" comment="php5-sysvsem-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092467" comment="php5-sysvshm-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092468" comment="php5-tidy-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092469" comment="php5-tokenizer-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092470" comment="php5-wddx-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092471" comment="php5-xmlreader-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092472" comment="php5-xmlrpc-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092473" comment="php5-xmlwriter-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092474" comment="php5-xsl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092475" comment="php5-zip-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092476" comment="php5-zlib-5.3.17-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6424</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424" source="CVE"/>
    <description>
    Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092477" comment="xorg-x11-server-7.6_1.13.2-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092478" comment="xorg-x11-server-extra-7.6_1.13.2-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092479" comment="xorg-x11-server-sdk-7.6_1.13.2-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6425</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425" source="CVE"/>
    <description>
    Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as used in X.Org server and cairo, allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092547" comment="libpixman-1-0-0.28.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092548" comment="libpixman-1-0-32bit-0.28.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092549" comment="libpixman-1-0-devel-0.28.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092550" comment="pixman-0.28.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6427</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" source="CVE"/>
    <description>
    upgrade.py in the hp-upgrade service in HP Linux Imaging and Printing (HPLIP) 3.x through 3.13.11 launches a program from an http URL, which allows man-in-the-middle attackers to execute arbitrary code by gaining control over the client-server data stream.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093074" comment="hplip-3.12.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093075" comment="hplip-hpijs-3.12.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093076" comment="hplip-sane-3.12.11-2.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6431</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6431" source="CVE"/>
    <description>
    The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6435</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" source="CVE"/>
    <description>
    Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103204" comment="python3-rpm-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103205" comment="rpm-python-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103206" comment="rpm-32bit-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103207" comment="rpm-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103208" comment="rpm-build-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103209" comment="rpm-devel-4.10.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6438</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438" source="CVE"/>
    <description>
    The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099589" comment="apache2-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099590" comment="apache2-devel-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099591" comment="apache2-doc-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099592" comment="apache2-event-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099593" comment="apache2-example-pages-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099594" comment="apache2-itk-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099595" comment="apache2-prefork-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099596" comment="apache2-utils-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099597" comment="apache2-worker-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102728" comment="apache2-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102729" comment="apache2-devel-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102730" comment="apache2-doc-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102731" comment="apache2-event-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102732" comment="apache2-example-pages-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102733" comment="apache2-itk-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102734" comment="apache2-prefork-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102735" comment="apache2-utils-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102736" comment="apache2-worker-2.2.29-10.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6449</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449" source="CVE"/>
    <description>
    The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092551" comment="libopenssl-devel-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092552" comment="libopenssl-devel-32bit-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092553" comment="libopenssl1_0_0-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092554" comment="libopenssl1_0_0-32bit-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092555" comment="openssl-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092556" comment="openssl-doc-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092708" comment="libopenssl-devel-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092709" comment="libopenssl-devel-32bit-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092710" comment="libopenssl1_0_0-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092711" comment="libopenssl1_0_0-32bit-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092712" comment="openssl-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092713" comment="openssl-doc-1.0.1e-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6450</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450" source="CVE"/>
    <description>
    The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092708" comment="libopenssl-devel-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092709" comment="libopenssl-devel-32bit-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092710" comment="libopenssl1_0_0-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092711" comment="libopenssl1_0_0-32bit-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092712" comment="openssl-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092713" comment="openssl-doc-1.0.1e-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6458</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458" source="CVE"/>
    <description>
    Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093548" comment="libvirt-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093549" comment="libvirt-client-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093550" comment="libvirt-client-32bit-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093551" comment="libvirt-devel-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093552" comment="libvirt-devel-32bit-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093553" comment="libvirt-doc-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093554" comment="libvirt-lock-sanlock-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093555" comment="libvirt-python-1.0.2-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6462</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462" source="CVE"/>
    <description>
    Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092960" comment="libXfont-1.4.5-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092961" comment="libXfont-devel-1.4.5-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092962" comment="libXfont-devel-32bit-1.4.5-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092963" comment="libXfont1-1.4.5-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092964" comment="libXfont1-32bit-1.4.5-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6477</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" source="CVE"/>
    <description>
    Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6478</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" source="CVE"/>
    <description>
    gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6479</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" source="CVE"/>
    <description>
    util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6481</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" source="CVE"/>
    <description>
    libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6482</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" source="CVE"/>
    <description>
    Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6483</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" source="CVE"/>
    <description>
    The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6484</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" source="CVE"/>
    <description>
    The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6485</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" source="CVE"/>
    <description>
    Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6486</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486" source="CVE"/>
    <description>
    gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6487</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" source="CVE"/>
    <description>
    Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096132" comment="libgadu-1.11.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096133" comment="libgadu-devel-1.11.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096134" comment="libgadu3-1.11.4-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6493</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6493" source="CVE"/>
    <description>
    The LiveConnect implementation in plugin/icedteanp/IcedTeaNPPlugin.cc in IcedTea-Web before 1.4.2 allows local users to read the messages between a Java applet and a web browser by pre-creating a temporary socket file with a predictable name in /tmp.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093691" comment="icedtea-web-1.4.2-4.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093692" comment="icedtea-web-javadoc-1.4.2-4.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6497</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6497" source="CVE"/>
    <description>
    clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102494" comment="clamav-0.98.5-5.30.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6621</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6621" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6622</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6622" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTMLMediaElement::didMoveToNewDocument function in core/html/HTMLMediaElement.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the movement of a media element between documents.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6623</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6623" source="CVE"/>
    <description>
    The SVG implementation in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging the use of tree order, rather than transitive dependency order, for layout.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6624</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6624" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6625</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6625" source="CVE"/>
    <description>
    Use-after-free vulnerability in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of DOM range objects in circumstances that require child node removal after a (1) mutation or (2) blur event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6626</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6626" source="CVE"/>
    <description>
    The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6627</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6627" source="CVE"/>
    <description>
    net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6628</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6628" source="CVE"/>
    <description>
    net/socket/ssl_client_socket_nss.cc in the TLS implementation in Google Chrome before 31.0.1650.48 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which might allow remote web servers to interfere with trust relationships by renegotiating a session.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6629</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" source="CVE"/>
    <description>
    The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6630</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630" source="CVE"/>
    <description>
    The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6631</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6631" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6632</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632" source="CVE"/>
    <description>
    Integer overflow in Google Chrome before 31.0.1650.57 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6634</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6634" source="CVE"/>
    <description>
    The OneClickSigninHelper::ShowInfoBarIfPossible function in browser/ui/sync/one_click_signin_helper.cc in Google Chrome before 31.0.1650.63 uses an incorrect URL during realm validation, which allows remote attackers to conduct session fixation attacks and hijack web sessions by triggering improper sync after a 302 (aka Found) HTTP status code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092208" comment="chromedriver-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092209" comment="chromium-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092210" comment="chromium-desktop-gnome-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092211" comment="chromium-desktop-kde-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092212" comment="chromium-ffmpegsumo-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092213" comment="chromium-suid-helper-31.0.1650.63-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6635</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6635" source="CVE"/>
    <description>
    Use-after-free vulnerability in the editing implementation in Blink, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that triggers removal of a node during processing of the DOM tree, related to CompositeEditCommand.cpp and ReplaceSelectionCommand.cpp.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092208" comment="chromedriver-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092209" comment="chromium-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092210" comment="chromium-desktop-gnome-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092211" comment="chromium-desktop-kde-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092212" comment="chromium-ffmpegsumo-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092213" comment="chromium-suid-helper-31.0.1650.63-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6636</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6636" source="CVE"/>
    <description>
    The FrameLoader::notifyIfInitialDocumentAccessed function in core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 31.0.1650.63, makes an incorrect check for an empty document during presentation of a modal dialog, which allows remote attackers to spoof the address bar via vectors involving the document.write method.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092208" comment="chromedriver-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092209" comment="chromium-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092210" comment="chromium-desktop-gnome-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092211" comment="chromium-desktop-kde-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092212" comment="chromium-ffmpegsumo-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092213" comment="chromium-suid-helper-31.0.1650.63-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6637</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6637" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092208" comment="chromedriver-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092209" comment="chromium-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092210" comment="chromium-desktop-gnome-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092211" comment="chromium-desktop-kde-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092212" comment="chromium-ffmpegsumo-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092213" comment="chromium-suid-helper-31.0.1650.63-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6638</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6638" source="CVE"/>
    <description>
    Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092208" comment="chromedriver-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092209" comment="chromium-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092210" comment="chromium-desktop-gnome-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092211" comment="chromium-desktop-kde-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092212" comment="chromium-ffmpegsumo-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092213" comment="chromium-suid-helper-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092272" comment="libv8-3-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092273" comment="v8-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092274" comment="v8-devel-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092275" comment="v8-private-headers-devel-3.22.24.8-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6639</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639" source="CVE"/>
    <description>
    The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092208" comment="chromedriver-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092209" comment="chromium-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092210" comment="chromium-desktop-gnome-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092211" comment="chromium-desktop-kde-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092212" comment="chromium-ffmpegsumo-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092213" comment="chromium-suid-helper-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092272" comment="libv8-3-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092273" comment="v8-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092274" comment="v8-devel-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092275" comment="v8-private-headers-devel-3.22.24.8-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6640</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640" source="CVE"/>
    <description>
    The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092208" comment="chromedriver-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092209" comment="chromium-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092210" comment="chromium-desktop-gnome-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092211" comment="chromium-desktop-kde-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092212" comment="chromium-ffmpegsumo-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092213" comment="chromium-suid-helper-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092272" comment="libv8-3-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092273" comment="v8-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092274" comment="v8-devel-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092275" comment="v8-private-headers-devel-3.22.24.8-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6641</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6641" source="CVE"/>
    <description>
    Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree function in core/html/FormAssociatedElement.cpp in Blink, as used in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of the past names map of a FORM element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093503" comment="chromedriver-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093504" comment="chromium-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093505" comment="chromium-desktop-gnome-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093506" comment="chromium-desktop-kde-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093507" comment="chromium-ffmpegsumo-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093508" comment="chromium-suid-helper-32.0.1700.102-1.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6643</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6643" source="CVE"/>
    <description>
    The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing of an untrusted signin confirm dialog.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093503" comment="chromedriver-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093504" comment="chromium-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093505" comment="chromium-desktop-gnome-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093506" comment="chromium-desktop-kde-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093507" comment="chromium-ffmpegsumo-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093508" comment="chromium-suid-helper-32.0.1700.102-1.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6644</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6644" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093503" comment="chromedriver-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093504" comment="chromium-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093505" comment="chromium-desktop-gnome-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093506" comment="chromium-desktop-kde-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093507" comment="chromium-ffmpegsumo-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093508" comment="chromium-suid-helper-32.0.1700.102-1.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6645</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6645" source="CVE"/>
    <description>
    Use-after-free vulnerability in the OnWindowRemovingFromRootWindow function in content/browser/web_contents/web_contents_view_aura.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving certain print-preview and tab-switch actions that interact with a speech input element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093503" comment="chromedriver-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093504" comment="chromium-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093505" comment="chromium-desktop-gnome-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093506" comment="chromium-desktop-kde-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093507" comment="chromium-ffmpegsumo-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093508" comment="chromium-suid-helper-32.0.1700.102-1.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6646</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6646" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the shutting down of a worker process.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093503" comment="chromedriver-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093504" comment="chromium-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093505" comment="chromium-desktop-gnome-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093506" comment="chromium-desktop-kde-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093507" comment="chromium-ffmpegsumo-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093508" comment="chromium-suid-helper-32.0.1700.102-1.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6649</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6649" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RenderSVGImage::paint function in core/rendering/svg/RenderSVGImage.cpp in Blink, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a zero-size SVG image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093503" comment="chromedriver-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093504" comment="chromium-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093505" comment="chromium-desktop-gnome-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093506" comment="chromium-desktop-kde-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093507" comment="chromium-ffmpegsumo-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093508" comment="chromium-suid-helper-32.0.1700.102-1.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6650</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6650" source="CVE"/>
    <description>
    The StoreBuffer::ExemptPopularPages function in store-buffer.cc in Google V8 before 3.22.24.16, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors that trigger incorrect handling of "popular pages."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093503" comment="chromedriver-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093504" comment="chromium-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093505" comment="chromium-desktop-gnome-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093506" comment="chromium-desktop-kde-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093507" comment="chromium-ffmpegsumo-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093508" comment="chromium-suid-helper-32.0.1700.102-1.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6653</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6653" source="CVE"/>
    <description>
    Use-after-free vulnerability in the web contents implementation in Google Chrome before 33.0.1750.117 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving attempted conflicting access to the color chooser.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6654</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6654" source="CVE"/>
    <description>
    The SVGAnimateElement::calculateAnimatedValue function in core/svg/SVGAnimateElement.cpp in Blink, as used in Google Chrome before 33.0.1750.117, does not properly handle unexpected data types, which allows remote attackers to cause a denial of service (incorrect cast) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6655</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6655" source="CVE"/>
    <description>
    Use-after-free vulnerability in Blink, as used in Google Chrome before 33.0.1750.117, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper handling of overflowchanged DOM events during interaction between JavaScript and layout.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6656</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6656" source="CVE"/>
    <description>
    The XSSAuditor::init function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 33.0.1750.117, processes POST requests by using the body of a redirecting page instead of the body of a redirect target, which allows remote attackers to obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6657</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6657" source="CVE"/>
    <description>
    core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 33.0.1750.117, inserts the about:blank URL during certain blocking of FORM elements within HTTP requests, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6658</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6658" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the layout implementation in Blink, as used in Google Chrome before 33.0.1750.117, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving (1) running JavaScript code during execution of the updateWidgetPositions function or (2) making a call into a plugin during execution of the updateWidgetPositions function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6659</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6659" source="CVE"/>
    <description>
    The SSLClientSocketNSS::Core::OwnAuthCertHandler function in net/socket/ssl_client_socket_nss.cc in Google Chrome before 33.0.1750.117 does not prevent changes to server X.509 certificates during renegotiations, which allows remote SSL servers to trigger use of a new certificate chain, inconsistent with the user's expectations, by initiating a TLS renegotiation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6660</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6660" source="CVE"/>
    <description>
    The drag-and-drop implementation in Google Chrome before 33.0.1750.117 does not properly restrict the information in WebDropData data structures, which allows remote attackers to discover full pathnames via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6661</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6661" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 33.0.1750.117 allow attackers to bypass the sandbox protection mechanism after obtaining renderer access, or have other impact, via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6671</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6672</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6673</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6712</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712" source="CVE"/>
    <description>
    The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092421" comment="apache2-mod_php5-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092422" comment="php5-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092423" comment="php5-bcmath-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092424" comment="php5-bz2-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092425" comment="php5-calendar-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092426" comment="php5-ctype-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092427" comment="php5-curl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092428" comment="php5-dba-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092429" comment="php5-devel-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092430" comment="php5-dom-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092431" comment="php5-enchant-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092432" comment="php5-exif-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092433" comment="php5-fastcgi-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092434" comment="php5-fileinfo-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092435" comment="php5-fpm-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092436" comment="php5-ftp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092437" comment="php5-gd-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092438" comment="php5-gettext-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092439" comment="php5-gmp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092440" comment="php5-iconv-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092441" comment="php5-imap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092442" comment="php5-intl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092443" comment="php5-json-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092444" comment="php5-ldap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092445" comment="php5-mbstring-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092446" comment="php5-mcrypt-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092447" comment="php5-mssql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092448" comment="php5-mysql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092449" comment="php5-odbc-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092450" comment="php5-openssl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092451" comment="php5-pcntl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092452" comment="php5-pdo-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092453" comment="php5-pear-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092454" comment="php5-pgsql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092455" comment="php5-phar-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092456" comment="php5-posix-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092457" comment="php5-pspell-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092458" comment="php5-readline-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092459" comment="php5-shmop-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092460" comment="php5-snmp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092461" comment="php5-soap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092462" comment="php5-sockets-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092463" comment="php5-sqlite-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092464" comment="php5-suhosin-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092465" comment="php5-sysvmsg-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092466" comment="php5-sysvsem-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092467" comment="php5-sysvshm-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092468" comment="php5-tidy-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092469" comment="php5-tokenizer-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092470" comment="php5-wddx-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092471" comment="php5-xmlreader-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092472" comment="php5-xmlrpc-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092473" comment="php5-xmlwriter-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092474" comment="php5-xsl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092475" comment="php5-zip-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092476" comment="php5-zlib-5.3.17-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6836</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6836" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ms_escher_get_data function in plugins/excel/ms-escher.c in GNOME Office Gnumeric before 1.12.9 allows remote attackers to cause a denial of service (crash) via a crafted xls file with a crafted length value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093112" comment="gnumeric-1.12.0-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093113" comment="gnumeric-devel-1.12.0-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093114" comment="gnumeric-lang-1.12.0-2.4.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6838</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6838" source="CVE"/>
    <description>
    An unspecified Enghouse Interactive Professional Services "addon product" in Enghouse Interactive IVR Pro (VIP2000) 9.0.3 (rel903), when using OpenVZ and fallback customization, uses the same SSH private key across different customers' installations, which allows remote attackers to gain privileges by leveraging knowledge of this key.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093112" comment="gnumeric-1.12.0-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093113" comment="gnumeric-devel-1.12.0-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093114" comment="gnumeric-lang-1.12.0-2.4.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6885</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885" source="CVE"/>
    <description>
    The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6954</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-6954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954" source="CVE"/>
    <description>
    The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7027</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7027" source="CVE"/>
    <description>
    The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7107</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7107" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093559" comment="icinga-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093560" comment="icinga-devel-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093561" comment="icinga-doc-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093562" comment="icinga-idoutils-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093563" comment="icinga-idoutils-mysql-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093564" comment="icinga-idoutils-oracle-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093565" comment="icinga-idoutils-pgsql-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093566" comment="icinga-plugins-downtimes-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093567" comment="icinga-plugins-eventhandlers-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093568" comment="icinga-www-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093569" comment="monitoring-tools-1.10.2-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7108</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7108" source="CVE"/>
    <description>
    Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092557" comment="nagios-3.5.0-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092558" comment="nagios-devel-3.5.0-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092559" comment="nagios-www-3.5.0-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092560" comment="nagios-www-dch-3.5.0-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093009" comment="icinga-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093010" comment="icinga-devel-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093011" comment="icinga-doc-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093012" comment="icinga-idoutils-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093013" comment="icinga-idoutils-mysql-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093014" comment="icinga-idoutils-oracle-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093015" comment="icinga-idoutils-pgsql-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093016" comment="icinga-plugins-downtimes-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093017" comment="icinga-plugins-eventhandlers-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093018" comment="icinga-www-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093019" comment="monitoring-tools-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093020" comment="nagios-rpm-macros-0.08-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7112</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092545" comment="wireshark-1.8.12-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092546" comment="wireshark-devel-1.8.12-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7113</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113" source="CVE"/>
    <description>
    epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092545" comment="wireshark-1.8.12-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092546" comment="wireshark-devel-1.8.12-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7114</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114" source="CVE"/>
    <description>
    Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092545" comment="wireshark-1.8.12-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092546" comment="wireshark-devel-1.8.12-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7176</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7176" source="CVE"/>
    <description>
    config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094033" comment="fail2ban-0.8.12-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7177</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7177" source="CVE"/>
    <description>
    config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094033" comment="fail2ban-0.8.12-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7239</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7239" source="CVE"/>
    <description>
    memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097488" comment="memcached-1.4.20-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7290</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7290" source="CVE"/>
    <description>
    The do_item_get function in items.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr, a different vulnerability than CVE-2013-0179.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097488" comment="memcached-1.4.20-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7291</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7291" source="CVE"/>
    <description>
    memcached before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (crash) via a request that triggers an "unbounded key print" during logging, related to an issue that was "quickly grepped out of the source tree," a different vulnerability than CVE-2013-0179 and CVE-2013-7290.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097488" comment="memcached-1.4.20-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7295</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7295" source="CVE"/>
    <description>
    Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easier for remote attackers to bypass cryptographic protection mechanisms via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093150" comment="tor-0.2.3.25-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7296</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7296" source="CVE"/>
    <description>
    The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093374" comment="libpoppler-qt4-4-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093375" comment="libpoppler-qt4-devel-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093376" comment="poppler-qt-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093377" comment="libpoppler-cpp0-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093378" comment="libpoppler-devel-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093379" comment="libpoppler-glib-devel-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093380" comment="libpoppler-glib8-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093381" comment="libpoppler34-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093382" comment="poppler-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093383" comment="poppler-tools-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093384" comment="typelib-1_0-Poppler-0_18-0.22.1-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7338</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7338" source="CVE"/>
    <description>
    Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095335" comment="libpython3_3m1_0-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095336" comment="libpython3_3m1_0-32bit-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095337" comment="python3-base-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095338" comment="python3-base-32bit-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095339" comment="python3-devel-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095340" comment="python3-idle-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095341" comment="python3-testsuite-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095342" comment="python3-tools-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095343" comment="python3-doc-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095344" comment="python3-doc-pdf-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095345" comment="python3-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095346" comment="python3-32bit-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095347" comment="python3-curses-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095348" comment="python3-dbm-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095349" comment="python3-tk-3.3.0-6.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7339</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339" source="CVE"/>
    <description>
    The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097171" comment="kernel-debug-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097172" comment="kernel-debug-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097173" comment="kernel-debug-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097174" comment="kernel-default-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097175" comment="kernel-default-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097176" comment="kernel-default-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097177" comment="kernel-desktop-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097178" comment="kernel-desktop-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097179" comment="kernel-desktop-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097180" comment="kernel-docs-3.7.10-1.36.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097181" comment="kernel-ec2-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097182" comment="kernel-ec2-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097183" comment="kernel-ec2-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097184" comment="kernel-pae-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097185" comment="kernel-pae-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097186" comment="kernel-pae-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097187" comment="kernel-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097188" comment="kernel-source-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097189" comment="kernel-source-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097190" comment="kernel-syms-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097191" comment="kernel-trace-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097192" comment="kernel-trace-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097193" comment="kernel-trace-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097194" comment="kernel-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097195" comment="kernel-vanilla-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097196" comment="kernel-xen-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097197" comment="kernel-xen-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097198" comment="kernel-xen-devel-3.7.10-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7345</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345" source="CVE"/>
    <description>
    The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094665" comment="file-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094666" comment="file-devel-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094667" comment="libmagic-data-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094668" comment="libmagic1-32bit-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094669" comment="libmagic1-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094670" comment="python-magic-5.11-12.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7353</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353" source="CVE"/>
    <description>
    Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095493" comment="libpng15-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095494" comment="libpng15-15-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095495" comment="libpng15-15-32bit-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095496" comment="libpng15-compat-devel-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095497" comment="libpng15-compat-devel-32bit-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095498" comment="libpng15-devel-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095499" comment="libpng15-devel-32bit-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095500" comment="libpng12-0-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095501" comment="libpng12-0-32bit-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095502" comment="libpng12-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095503" comment="libpng12-compat-devel-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095504" comment="libpng12-compat-devel-32bit-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095505" comment="libpng12-devel-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095506" comment="libpng12-devel-32bit-1.2.50-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7354</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2013-7354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354" source="CVE"/>
    <description>
    Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095493" comment="libpng15-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095494" comment="libpng15-15-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095495" comment="libpng15-15-32bit-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095496" comment="libpng15-compat-devel-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095497" comment="libpng15-compat-devel-32bit-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095498" comment="libpng15-devel-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095499" comment="libpng15-devel-32bit-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095500" comment="libpng12-0-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095501" comment="libpng12-0-32bit-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095502" comment="libpng12-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095503" comment="libpng12-compat-devel-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095504" comment="libpng12-compat-devel-32bit-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095505" comment="libpng12-devel-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095506" comment="libpng12-devel-32bit-1.2.50-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0004</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004" source="CVE"/>
    <description>
    Stack-based buffer overflow in udisks before 1.0.5 and 2.x before 2.1.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long mount point.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094189" comment="udisks-1.0.4-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094190" comment="udisks-devel-1.0.4-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094191" comment="libudisks2-0-2.0.0-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094192" comment="typelib-1_0-UDisks-2_0-2.0.0-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094193" comment="udisks2-2.0.0-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094194" comment="udisks2-devel-2.0.0-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094195" comment="udisks2-lang-2.0.0-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0015</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093620" comment="curl-7.28.1-4.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093621" comment="libcurl-devel-7.28.1-4.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093622" comment="libcurl4-32bit-7.28.1-4.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093623" comment="libcurl4-7.28.1-4.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0017</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017" source="CVE"/>
    <description>
    The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094359" comment="libssh-0.5.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094360" comment="libssh-devel-0.5.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094361" comment="libssh-devel-doc-0.5.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094362" comment="libssh4-0.5.3-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0020</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" source="CVE"/>
    <description>
    The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0032</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0032" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032" source="CVE"/>
    <description>
    The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093970" comment="libsvn_auth_gnome_keyring-1-0-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093971" comment="libsvn_auth_kwallet-1-0-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093972" comment="subversion-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093973" comment="subversion-bash-completion-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093974" comment="subversion-devel-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093975" comment="subversion-perl-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093976" comment="subversion-python-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093977" comment="subversion-server-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093978" comment="subversion-tools-1.7.16-2.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0038</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0038" source="CVE"/>
    <description>
    The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0044</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0044" source="CVE"/>
    <description>
    The opus_packet_get_samples_per_frame function in client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots allows remote attackers to cause a denial of service (crash) via a crafted length prefix value, which triggers a NULL pointer dereference or a heap-based buffer over-read (aka "out-of-bounds array access").
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093556" comment="mumble-1.2.5-21.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093557" comment="mumble-32bit-1.2.5-21.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093558" comment="mumble-server-1.2.5-21.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0045</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0045" source="CVE"/>
    <description>
    The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Opus voice packet, which triggers an error in opus_decode_float, a conversion of a negative integer to an unsigned integer, and a heap-based buffer over-read and over-write.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093556" comment="mumble-1.2.5-21.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093557" comment="mumble-32bit-1.2.5-21.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093558" comment="mumble-server-1.2.5-21.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0050</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050" source="CVE"/>
    <description>
    MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095130" comment="jakarta-commons-fileupload-1.1.1-114.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095131" comment="jakarta-commons-fileupload-javadoc-1.1.1-114.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0055</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055" source="CVE"/>
    <description>
    The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097171" comment="kernel-debug-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097172" comment="kernel-debug-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097173" comment="kernel-debug-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097174" comment="kernel-default-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097175" comment="kernel-default-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097176" comment="kernel-default-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097177" comment="kernel-desktop-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097178" comment="kernel-desktop-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097179" comment="kernel-desktop-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097180" comment="kernel-docs-3.7.10-1.36.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097181" comment="kernel-ec2-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097182" comment="kernel-ec2-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097183" comment="kernel-ec2-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097184" comment="kernel-pae-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097185" comment="kernel-pae-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097186" comment="kernel-pae-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097187" comment="kernel-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097188" comment="kernel-source-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097189" comment="kernel-source-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097190" comment="kernel-syms-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097191" comment="kernel-trace-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097192" comment="kernel-trace-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097193" comment="kernel-trace-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097194" comment="kernel-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097195" comment="kernel-vanilla-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097196" comment="kernel-xen-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097197" comment="kernel-xen-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097198" comment="kernel-xen-devel-3.7.10-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0060</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060" source="CVE"/>
    <description>
    PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094020" comment="libecpg6-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094021" comment="libecpg6-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094022" comment="libpq5-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094023" comment="libpq5-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094024" comment="postgresql92-devel-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094025" comment="postgresql92-libs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094026" comment="postgresql92-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094027" comment="postgresql92-contrib-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094028" comment="postgresql92-docs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094029" comment="postgresql92-plperl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094030" comment="postgresql92-plpython-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094031" comment="postgresql92-pltcl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094032" comment="postgresql92-server-9.2.7-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0061</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061" source="CVE"/>
    <description>
    The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094020" comment="libecpg6-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094021" comment="libecpg6-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094022" comment="libpq5-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094023" comment="libpq5-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094024" comment="postgresql92-devel-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094025" comment="postgresql92-libs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094026" comment="postgresql92-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094027" comment="postgresql92-contrib-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094028" comment="postgresql92-docs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094029" comment="postgresql92-plperl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094030" comment="postgresql92-plpython-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094031" comment="postgresql92-pltcl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094032" comment="postgresql92-server-9.2.7-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0062</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062" source="CVE"/>
    <description>
    Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094020" comment="libecpg6-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094021" comment="libecpg6-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094022" comment="libpq5-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094023" comment="libpq5-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094024" comment="postgresql92-devel-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094025" comment="postgresql92-libs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094026" comment="postgresql92-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094027" comment="postgresql92-contrib-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094028" comment="postgresql92-docs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094029" comment="postgresql92-plperl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094030" comment="postgresql92-plpython-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094031" comment="postgresql92-pltcl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094032" comment="postgresql92-server-9.2.7-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0063</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094020" comment="libecpg6-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094021" comment="libecpg6-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094022" comment="libpq5-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094023" comment="libpq5-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094024" comment="postgresql92-devel-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094025" comment="postgresql92-libs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094026" comment="postgresql92-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094027" comment="postgresql92-contrib-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094028" comment="postgresql92-docs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094029" comment="postgresql92-plperl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094030" comment="postgresql92-plpython-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094031" comment="postgresql92-pltcl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094032" comment="postgresql92-server-9.2.7-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0064</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064" source="CVE"/>
    <description>
    Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow.  NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094020" comment="libecpg6-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094021" comment="libecpg6-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094022" comment="libpq5-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094023" comment="libpq5-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094024" comment="postgresql92-devel-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094025" comment="postgresql92-libs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094026" comment="postgresql92-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094027" comment="postgresql92-contrib-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094028" comment="postgresql92-docs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094029" comment="postgresql92-plperl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094030" comment="postgresql92-plpython-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094031" comment="postgresql92-pltcl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094032" comment="postgresql92-server-9.2.7-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0065</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065" source="CVE"/>
    <description>
    Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094020" comment="libecpg6-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094021" comment="libecpg6-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094022" comment="libpq5-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094023" comment="libpq5-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094024" comment="postgresql92-devel-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094025" comment="postgresql92-libs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094026" comment="postgresql92-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094027" comment="postgresql92-contrib-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094028" comment="postgresql92-docs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094029" comment="postgresql92-plperl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094030" comment="postgresql92-plpython-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094031" comment="postgresql92-pltcl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094032" comment="postgresql92-server-9.2.7-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0066</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066" source="CVE"/>
    <description>
    The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094020" comment="libecpg6-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094021" comment="libecpg6-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094022" comment="libpq5-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094023" comment="libpq5-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094024" comment="postgresql92-devel-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094025" comment="postgresql92-libs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094026" comment="postgresql92-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094027" comment="postgresql92-contrib-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094028" comment="postgresql92-docs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094029" comment="postgresql92-plperl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094030" comment="postgresql92-plpython-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094031" comment="postgresql92-pltcl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094032" comment="postgresql92-server-9.2.7-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0067</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067" source="CVE"/>
    <description>
    The "make check" command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094020" comment="libecpg6-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094021" comment="libecpg6-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094022" comment="libpq5-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094023" comment="libpq5-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094024" comment="postgresql92-devel-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094025" comment="postgresql92-libs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094026" comment="postgresql92-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094027" comment="postgresql92-contrib-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094028" comment="postgresql92-docs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094029" comment="postgresql92-plperl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094030" comment="postgresql92-plpython-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094031" comment="postgresql92-pltcl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094032" comment="postgresql92-server-9.2.7-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0076</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076" source="CVE"/>
    <description>
    The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094659" comment="libopenssl-devel-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094660" comment="libopenssl-devel-32bit-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094661" comment="libopenssl1_0_0-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094662" comment="libopenssl1_0_0-32bit-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094663" comment="openssl-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094664" comment="openssl-doc-1.0.1e-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0077</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077" source="CVE"/>
    <description>
    drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097171" comment="kernel-debug-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097172" comment="kernel-debug-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097173" comment="kernel-debug-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097174" comment="kernel-default-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097175" comment="kernel-default-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097176" comment="kernel-default-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097177" comment="kernel-desktop-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097178" comment="kernel-desktop-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097179" comment="kernel-desktop-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097180" comment="kernel-docs-3.7.10-1.36.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097181" comment="kernel-ec2-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097182" comment="kernel-ec2-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097183" comment="kernel-ec2-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097184" comment="kernel-pae-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097185" comment="kernel-pae-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097186" comment="kernel-pae-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097187" comment="kernel-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097188" comment="kernel-source-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097189" comment="kernel-source-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097190" comment="kernel-syms-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097191" comment="kernel-trace-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097192" comment="kernel-trace-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097193" comment="kernel-trace-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097194" comment="kernel-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097195" comment="kernel-vanilla-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097196" comment="kernel-xen-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097197" comment="kernel-xen-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097198" comment="kernel-xen-devel-3.7.10-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0081</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0081" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093637" comment="rubygem-actionpack-3_2-3.2.12-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093638" comment="rubygem-actionpack-3_2-doc-3.2.12-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0082</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0082" source="CVE"/>
    <description>
    actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093637" comment="rubygem-actionpack-3_2-3.2.12-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093638" comment="rubygem-actionpack-3_2-doc-3.2.12-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0092</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092" source="CVE"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093946" comment="gnutls-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093947" comment="libgnutls-devel-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093948" comment="libgnutls-devel-32bit-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093949" comment="libgnutls-openssl-devel-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093950" comment="libgnutls-openssl27-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093951" comment="libgnutls28-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093952" comment="libgnutls28-32bit-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093953" comment="libgnutlsxx-devel-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093954" comment="libgnutlsxx28-3.0.28-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0098</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098" source="CVE"/>
    <description>
    The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099589" comment="apache2-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099590" comment="apache2-devel-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099591" comment="apache2-doc-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099592" comment="apache2-event-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099593" comment="apache2-example-pages-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099594" comment="apache2-itk-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099595" comment="apache2-prefork-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099596" comment="apache2-utils-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099597" comment="apache2-worker-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102728" comment="apache2-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102729" comment="apache2-devel-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102730" comment="apache2-doc-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102731" comment="apache2-event-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102732" comment="apache2-example-pages-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102733" comment="apache2-itk-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102734" comment="apache2-prefork-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102735" comment="apache2-utils-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102736" comment="apache2-worker-2.2.29-10.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0101</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101" source="CVE"/>
    <description>
    The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0107</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107" source="CVE"/>
    <description>
    The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097205" comment="xalan-j2-2.7.0-259.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097206" comment="xalan-j2-demo-2.7.0-259.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097207" comment="xalan-j2-javadoc-2.7.0-259.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097208" comment="xalan-j2-manual-2.7.0-259.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097209" comment="xalan-j2-xsltc-2.7.0-259.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0128</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0128" source="CVE"/>
    <description>
    Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095136" comment="squid-3.2.11-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0130</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0130" source="CVE"/>
    <description>
    Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096129" comment="rubygem-actionpack-3_2-3.2.12-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096130" comment="rubygem-actionpack-3_2-doc-3.2.12-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0131</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131" source="CVE"/>
    <description>
    Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0138</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138" source="CVE"/>
    <description>
    The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095331" comment="curl-7.28.1-4.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095332" comment="libcurl-devel-7.28.1-4.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095333" comment="libcurl4-32bit-7.28.1-4.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095334" comment="libcurl4-7.28.1-4.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0139</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139" source="CVE"/>
    <description>
    cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095331" comment="curl-7.28.1-4.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095332" comment="libcurl-devel-7.28.1-4.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095333" comment="libcurl4-32bit-7.28.1-4.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095334" comment="libcurl4-7.28.1-4.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0160</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160" source="CVE"/>
    <description>
    The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094698" comment="libopenssl-devel-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094699" comment="libopenssl-devel-32bit-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094700" comment="libopenssl1_0_0-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094701" comment="libopenssl1_0_0-32bit-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094702" comment="openssl-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094703" comment="openssl-doc-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095142" comment="libopenssl-devel-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095143" comment="libopenssl-devel-32bit-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095144" comment="libopenssl1_0_0-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095145" comment="libopenssl1_0_0-32bit-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095146" comment="openssl-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095147" comment="openssl-doc-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096131" comment="tor-0.2.4.22-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0172</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0172" source="CVE"/>
    <description>
    Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099290" comment="elfutils-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099291" comment="libasm-devel-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099292" comment="libasm1-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099293" comment="libasm1-32bit-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099294" comment="libdw-devel-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099295" comment="libdw1-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099296" comment="libdw1-32bit-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099297" comment="libebl-devel-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099298" comment="libebl1-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099299" comment="libebl1-32bit-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099300" comment="libelf-devel-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099301" comment="libelf-devel-32bit-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099302" comment="libelf1-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099303" comment="libelf1-32bit-0.155-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0178</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" source="CVE"/>
    <description>
    Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097210" comment="samba-doc-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097211" comment="libnetapi-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097212" comment="libnetapi0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097213" comment="libsmbclient-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097214" comment="libsmbclient0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097215" comment="libsmbclient0-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097216" comment="libsmbsharemodes-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097217" comment="libsmbsharemodes0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097218" comment="libwbclient-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097219" comment="libwbclient0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097220" comment="libwbclient0-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097221" comment="samba-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097222" comment="samba-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097223" comment="samba-client-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097224" comment="samba-client-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097225" comment="samba-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097226" comment="samba-krb-printing-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097227" comment="samba-winbind-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097228" comment="samba-winbind-32bit-3.6.12-59.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0179</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" source="CVE"/>
    <description>
    libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.  NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095660" comment="libvirt-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095661" comment="libvirt-client-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095662" comment="libvirt-client-32bit-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095663" comment="libvirt-devel-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095664" comment="libvirt-devel-32bit-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095665" comment="libvirt-doc-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095666" comment="libvirt-lock-sanlock-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095667" comment="libvirt-python-1.0.2-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0185</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185" source="CVE"/>
    <description>
    sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096503" comment="apache2-mod_php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096504" comment="php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096505" comment="php5-bcmath-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096506" comment="php5-bz2-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096507" comment="php5-calendar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096508" comment="php5-ctype-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096509" comment="php5-curl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096510" comment="php5-dba-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096511" comment="php5-devel-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096512" comment="php5-dom-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096513" comment="php5-enchant-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096514" comment="php5-exif-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096515" comment="php5-fastcgi-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096516" comment="php5-fileinfo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096517" comment="php5-fpm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096518" comment="php5-ftp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096519" comment="php5-gd-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096520" comment="php5-gettext-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096521" comment="php5-gmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096522" comment="php5-iconv-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096523" comment="php5-imap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096524" comment="php5-intl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096525" comment="php5-json-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096526" comment="php5-ldap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096527" comment="php5-mbstring-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096528" comment="php5-mcrypt-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096529" comment="php5-mssql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096530" comment="php5-mysql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096531" comment="php5-odbc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096532" comment="php5-openssl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096533" comment="php5-pcntl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096534" comment="php5-pdo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096535" comment="php5-pear-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096536" comment="php5-pgsql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096537" comment="php5-phar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096538" comment="php5-posix-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096539" comment="php5-pspell-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096540" comment="php5-readline-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096541" comment="php5-shmop-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096542" comment="php5-snmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096543" comment="php5-soap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096544" comment="php5-sockets-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096545" comment="php5-sqlite-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096546" comment="php5-suhosin-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096547" comment="php5-sysvmsg-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096548" comment="php5-sysvsem-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096549" comment="php5-sysvshm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096550" comment="php5-tidy-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096551" comment="php5-tokenizer-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096552" comment="php5-wddx-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096553" comment="php5-xmlreader-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096554" comment="php5-xmlrpc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096555" comment="php5-xmlwriter-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096556" comment="php5-xsl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096557" comment="php5-zip-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096558" comment="php5-zlib-5.3.17-3.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0191</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191" source="CVE"/>
    <description>
    The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095652" comment="libxml2-2-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095653" comment="libxml2-2-32bit-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095654" comment="libxml2-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095655" comment="libxml2-devel-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095656" comment="libxml2-devel-32bit-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095657" comment="libxml2-doc-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095658" comment="libxml2-tools-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095659" comment="python-libxml2-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096095" comment="libxml2-2-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096096" comment="libxml2-2-32bit-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096097" comment="libxml2-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096098" comment="libxml2-devel-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096099" comment="libxml2-devel-32bit-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096100" comment="libxml2-doc-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096101" comment="libxml2-tools-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096102" comment="python-libxml2-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096198" comment="libxml2-2-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096199" comment="libxml2-2-32bit-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096200" comment="libxml2-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096201" comment="libxml2-devel-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096202" comment="libxml2-devel-32bit-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096203" comment="libxml2-doc-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096204" comment="libxml2-tools-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096205" comment="python-libxml2-2.9.0-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0195</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195" source="CVE"/>
    <description>
    The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096346" comment="libopenssl-devel-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096347" comment="libopenssl-devel-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096348" comment="libopenssl1_0_0-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096349" comment="libopenssl1_0_0-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096350" comment="openssl-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096351" comment="openssl-doc-1.0.1h-1.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0196</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" source="CVE"/>
    <description>
    The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0198</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198" source="CVE"/>
    <description>
    The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095554" comment="libopenssl-devel-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095555" comment="libopenssl-devel-32bit-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095556" comment="libopenssl1_0_0-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095557" comment="libopenssl1_0_0-32bit-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095558" comment="openssl-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095559" comment="openssl-doc-1.0.1g-1.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0207</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207" source="CVE"/>
    <description>
    The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098175" comment="apache2-mod_php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098176" comment="php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098177" comment="php5-bcmath-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098178" comment="php5-bz2-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098179" comment="php5-calendar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098180" comment="php5-ctype-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098181" comment="php5-curl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098182" comment="php5-dba-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098183" comment="php5-devel-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098184" comment="php5-dom-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098185" comment="php5-enchant-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098186" comment="php5-exif-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098187" comment="php5-fastcgi-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098188" comment="php5-fileinfo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098189" comment="php5-fpm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098190" comment="php5-ftp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098191" comment="php5-gd-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098192" comment="php5-gettext-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098193" comment="php5-gmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098194" comment="php5-iconv-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098195" comment="php5-imap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098196" comment="php5-intl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098197" comment="php5-json-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098198" comment="php5-ldap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098199" comment="php5-mbstring-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098200" comment="php5-mcrypt-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098201" comment="php5-mssql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098202" comment="php5-mysql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098203" comment="php5-odbc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098204" comment="php5-openssl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098205" comment="php5-pcntl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098206" comment="php5-pdo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098207" comment="php5-pear-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098208" comment="php5-pgsql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098209" comment="php5-phar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098210" comment="php5-posix-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098211" comment="php5-pspell-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098212" comment="php5-readline-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098213" comment="php5-shmop-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098214" comment="php5-snmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098215" comment="php5-soap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098216" comment="php5-sockets-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098217" comment="php5-sqlite-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098218" comment="php5-suhosin-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098219" comment="php5-sysvmsg-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098220" comment="php5-sysvsem-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098221" comment="php5-sysvshm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098222" comment="php5-tidy-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098223" comment="php5-tokenizer-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098224" comment="php5-wddx-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098225" comment="php5-xmlreader-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098226" comment="php5-xmlrpc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098227" comment="php5-xmlwriter-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098228" comment="php5-xsl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098229" comment="php5-zip-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098230" comment="php5-zlib-5.3.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0209</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096080" comment="libXfont-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096081" comment="libXfont-devel-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096082" comment="libXfont-devel-32bit-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096083" comment="libXfont1-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096084" comment="libXfont1-32bit-1.4.5-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0210</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" source="CVE"/>
    <description>
    Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096080" comment="libXfont-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096081" comment="libXfont-devel-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096082" comment="libXfont-devel-32bit-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096083" comment="libXfont1-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096084" comment="libXfont1-32bit-1.4.5-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0211</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096080" comment="libXfont-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096081" comment="libXfont-devel-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096082" comment="libXfont-devel-32bit-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096083" comment="libXfont1-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096084" comment="libXfont1-32bit-1.4.5-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0221</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" source="CVE"/>
    <description>
    The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096346" comment="libopenssl-devel-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096347" comment="libopenssl-devel-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096348" comment="libopenssl1_0_0-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096349" comment="libopenssl1_0_0-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096350" comment="openssl-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096351" comment="openssl-doc-1.0.1h-1.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0224</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" source="CVE"/>
    <description>
    OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096346" comment="libopenssl-devel-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096347" comment="libopenssl-devel-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096348" comment="libopenssl1_0_0-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096349" comment="libopenssl1_0_0-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096350" comment="openssl-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096351" comment="openssl-doc-1.0.1h-1.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0226</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226" source="CVE"/>
    <description>
    Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099589" comment="apache2-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099590" comment="apache2-devel-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099591" comment="apache2-doc-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099592" comment="apache2-event-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099593" comment="apache2-example-pages-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099594" comment="apache2-itk-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099595" comment="apache2-prefork-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099596" comment="apache2-utils-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099597" comment="apache2-worker-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102728" comment="apache2-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102729" comment="apache2-devel-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102730" comment="apache2-doc-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102731" comment="apache2-event-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102732" comment="apache2-example-pages-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102733" comment="apache2-itk-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102734" comment="apache2-prefork-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102735" comment="apache2-utils-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102736" comment="apache2-worker-2.2.29-10.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0231</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231" source="CVE"/>
    <description>
    The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099589" comment="apache2-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099590" comment="apache2-devel-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099591" comment="apache2-doc-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099592" comment="apache2-event-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099593" comment="apache2-example-pages-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099594" comment="apache2-itk-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099595" comment="apache2-prefork-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099596" comment="apache2-utils-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099597" comment="apache2-worker-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102728" comment="apache2-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102729" comment="apache2-devel-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102730" comment="apache2-doc-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102731" comment="apache2-event-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102732" comment="apache2-example-pages-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102733" comment="apache2-itk-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102734" comment="apache2-prefork-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102735" comment="apache2-utils-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102736" comment="apache2-worker-2.2.29-10.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0237</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237" source="CVE"/>
    <description>
    The cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (performance degradation) by triggering many file_printf calls.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096503" comment="apache2-mod_php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096504" comment="php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096505" comment="php5-bcmath-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096506" comment="php5-bz2-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096507" comment="php5-calendar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096508" comment="php5-ctype-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096509" comment="php5-curl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096510" comment="php5-dba-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096511" comment="php5-devel-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096512" comment="php5-dom-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096513" comment="php5-enchant-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096514" comment="php5-exif-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096515" comment="php5-fastcgi-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096516" comment="php5-fileinfo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096517" comment="php5-fpm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096518" comment="php5-ftp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096519" comment="php5-gd-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096520" comment="php5-gettext-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096521" comment="php5-gmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096522" comment="php5-iconv-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096523" comment="php5-imap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096524" comment="php5-intl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096525" comment="php5-json-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096526" comment="php5-ldap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096527" comment="php5-mbstring-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096528" comment="php5-mcrypt-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096529" comment="php5-mssql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096530" comment="php5-mysql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096531" comment="php5-odbc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096532" comment="php5-openssl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096533" comment="php5-pcntl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096534" comment="php5-pdo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096535" comment="php5-pear-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096536" comment="php5-pgsql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096537" comment="php5-phar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096538" comment="php5-posix-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096539" comment="php5-pspell-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096540" comment="php5-readline-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096541" comment="php5-shmop-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096542" comment="php5-snmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096543" comment="php5-soap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096544" comment="php5-sockets-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096545" comment="php5-sqlite-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096546" comment="php5-suhosin-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096547" comment="php5-sysvmsg-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096548" comment="php5-sysvsem-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096549" comment="php5-sysvshm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096550" comment="php5-tidy-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096551" comment="php5-tokenizer-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096552" comment="php5-wddx-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096553" comment="php5-xmlreader-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096554" comment="php5-xmlrpc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096555" comment="php5-xmlwriter-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096556" comment="php5-xsl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096557" comment="php5-zip-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096558" comment="php5-zlib-5.3.17-3.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0238</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238" source="CVE"/>
    <description>
    The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096503" comment="apache2-mod_php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096504" comment="php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096505" comment="php5-bcmath-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096506" comment="php5-bz2-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096507" comment="php5-calendar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096508" comment="php5-ctype-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096509" comment="php5-curl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096510" comment="php5-dba-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096511" comment="php5-devel-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096512" comment="php5-dom-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096513" comment="php5-enchant-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096514" comment="php5-exif-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096515" comment="php5-fastcgi-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096516" comment="php5-fileinfo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096517" comment="php5-fpm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096518" comment="php5-ftp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096519" comment="php5-gd-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096520" comment="php5-gettext-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096521" comment="php5-gmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096522" comment="php5-iconv-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096523" comment="php5-imap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096524" comment="php5-intl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096525" comment="php5-json-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096526" comment="php5-ldap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096527" comment="php5-mbstring-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096528" comment="php5-mcrypt-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096529" comment="php5-mssql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096530" comment="php5-mysql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096531" comment="php5-odbc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096532" comment="php5-openssl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096533" comment="php5-pcntl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096534" comment="php5-pdo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096535" comment="php5-pear-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096536" comment="php5-pgsql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096537" comment="php5-phar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096538" comment="php5-posix-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096539" comment="php5-pspell-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096540" comment="php5-readline-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096541" comment="php5-shmop-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096542" comment="php5-snmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096543" comment="php5-soap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096544" comment="php5-sockets-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096545" comment="php5-sqlite-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096546" comment="php5-suhosin-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096547" comment="php5-sysvmsg-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096548" comment="php5-sysvsem-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096549" comment="php5-sysvshm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096550" comment="php5-tidy-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096551" comment="php5-tokenizer-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096552" comment="php5-wddx-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096553" comment="php5-xmlreader-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096554" comment="php5-xmlrpc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096555" comment="php5-xmlwriter-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096556" comment="php5-xsl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096557" comment="php5-zip-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096558" comment="php5-zlib-5.3.17-3.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0240</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0240" source="CVE"/>
    <description>
    The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096501" comment="apache2-mod_wsgi-3.3-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096502" comment="apache2-mod_wsgi-3.4-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0242</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0242" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096501" comment="apache2-mod_wsgi-3.3-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096502" comment="apache2-mod_wsgi-3.4-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0244</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" source="CVE"/>
    <description>
    The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097210" comment="samba-doc-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097211" comment="libnetapi-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097212" comment="libnetapi0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097213" comment="libsmbclient-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097214" comment="libsmbclient0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097215" comment="libsmbclient0-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097216" comment="libsmbsharemodes-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097217" comment="libsmbsharemodes0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097218" comment="libwbclient-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097219" comment="libwbclient0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097220" comment="libwbclient0-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097221" comment="samba-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097222" comment="samba-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097223" comment="samba-client-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097224" comment="samba-client-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097225" comment="samba-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097226" comment="samba-krb-printing-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097227" comment="samba-winbind-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097228" comment="samba-winbind-32bit-3.6.12-59.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0250</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0250" source="CVE"/>
    <description>
    Multiple integer overflows in client/X11/xf_graphics.c in FreeRDP allow remote attackers to have an unspecified impact via the width and height to the (1) xf_Pointer_New or (2) xf_Bitmap_Decompress function, which causes an incorrect amount of memory to be allocated.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097229" comment="freerdp-1.0.2-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097230" comment="freerdp-devel-1.0.2-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097231" comment="libfreerdp-1_0-1.0.2-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097232" comment="libfreerdp-1_0-plugins-1.0.2-11.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0368</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0368" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and Java SE Embedded 7u45, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to incorrect permission checks when listening on a socket, which allows attackers to escape the sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0373</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0373" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to throwing of an incorrect exception when SnmpStatusException should have been used in the SNMP implementation, which allows attackers to escape the sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0376</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0376" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAXP.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an improper check for "code permissions when creating document builder factories."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0408</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0408" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u45, when running on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0411</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information about encryption keys via a timing discrepancy during the TLS/SSL handshake.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0416</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAAS.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to how principals are set for the Subject class, which allows attackers to escape the sandbox using deserialization of a crafted Subject instance.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0422</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0422" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to missing package access checks in the Naming / JNDI component, which allows attackers to escape the sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0423</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote authenticated users to affect confidentiality and availability via unknown vectors related to Beans.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability in DocumentHandler.java, related to Beans decoding.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0428</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to "insufficient security checks in IIOP streams," which allows attackers to escape the sandbox.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0429</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0446</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0451</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-2412.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0452</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0458 and CVE-2014-2423.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0453</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0454</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0455</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-2402.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0456</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0457</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0458</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-2423.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0459</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect availability via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0460</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0461</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0466</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466" source="CVE"/>
    <description>
    The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094862" comment="a2ps-4.13-1353.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094863" comment="a2ps-devel-4.13-1353.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0467</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467" source="CVE"/>
    <description>
    Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094470" comment="mutt-1.5.21-36.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0472</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0472" source="CVE"/>
    <description>
    The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0473</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0473" source="CVE"/>
    <description>
    The caching framework in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached CSRF token for all anonymous users, which allows remote attackers to bypass CSRF protections by reading the CSRF cookie for anonymous users.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0474</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0474" source="CVE"/>
    <description>
    The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to "MySQL typecasting."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0475</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100031" comment="glibc-testsuite-2.17-4.13.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100032" comment="glibc-utils-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100033" comment="glibc-utils-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100034" comment="glibc-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100035" comment="glibc-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100036" comment="glibc-devel-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100037" comment="glibc-devel-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100038" comment="glibc-devel-static-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100039" comment="glibc-devel-static-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100040" comment="glibc-extra-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100041" comment="glibc-i18ndata-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100042" comment="glibc-info-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100043" comment="glibc-locale-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100044" comment="glibc-locale-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100045" comment="glibc-obsolete-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100046" comment="glibc-profile-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100047" comment="glibc-profile-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100048" comment="nscd-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100049" comment="glibc-html-2.17-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0477</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0477" source="CVE"/>
    <description>
    The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101047" comment="perl-Email-Address-1.892-11.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0480</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0480" source="CVE"/>
    <description>
    The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0481</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0481" source="CVE"/>
    <description>
    The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0482</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0482" source="CVE"/>
    <description>
    The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0483</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0483" source="CVE"/>
    <description>
    The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field parameter in a popup action to an admin change form page, as demonstrated by a /admin/auth/user/?pop=1&amp;t=password URI.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0591</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591" source="CVE"/>
    <description>
    The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093283" comment="bind-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093284" comment="bind-chrootenv-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093285" comment="bind-devel-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093286" comment="bind-doc-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093287" comment="bind-libs-32bit-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093288" comment="bind-libs-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093289" comment="bind-lwresd-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093290" comment="bind-utils-9.9.4P2-2.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0691</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0691" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0791</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0791" source="CVE"/>
    <description>
    Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097229" comment="freerdp-1.0.2-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097230" comment="freerdp-devel-1.0.2-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097231" comment="libfreerdp-1_0-1.0.2-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097232" comment="libfreerdp-1_0-plugins-1.0.2-11.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0979</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-0979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0979" source="CVE"/>
    <description>
    The start_authentication function in lightdm-gtk-greeter.c in LightDM GTK+ Greeter before 1.7.1 does not properly handle the return value from the lightdm_greeter_get_authentication_user function, which allows local users to cause a denial of service (NULL pointer dereference) via an empty username.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092957" comment="lightdm-gtk-greeter-1.3.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092958" comment="lightdm-gtk-greeter-branding-upstream-1.3.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092959" comment="lightdm-gtk-greeter-lang-1.3.1-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1418</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1418" source="CVE"/>
    <description>
    Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote attackers to obtain sensitive information or poison the cache via a request from certain browsers.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1438</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1438" source="CVE"/>
    <description>
    The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1444</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1444" source="CVE"/>
    <description>
    The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1445</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1445" source="CVE"/>
    <description>
    The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1446</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1446" source="CVE"/>
    <description>
    The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1447</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447" source="CVE"/>
    <description>
    Race condition in the virNetServerClientStartKeepAlive function in libvirt before 1.2.1 allows remote attackers to cause a denial of service (libvirtd crash) by closing a connection before a keepalive response is sent.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093548" comment="libvirt-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093549" comment="libvirt-client-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093550" comment="libvirt-client-32bit-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093551" comment="libvirt-devel-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093552" comment="libvirt-devel-32bit-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093553" comment="libvirt-doc-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093554" comment="libvirt-lock-sanlock-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093555" comment="libvirt-python-1.0.2-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1492</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" source="CVE"/>
    <description>
    The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1493</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1494</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1497</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" source="CVE"/>
    <description>
    The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1498</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498" source="CVE"/>
    <description>
    The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1499</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1500</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1502</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502" source="CVE"/>
    <description>
    The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to bypass the Same Origin Policy and render content in a different domain via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1504</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504" source="CVE"/>
    <description>
    The session-restore feature in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document that is accessed after a browser restart.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1505</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" source="CVE"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1508</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" source="CVE"/>
    <description>
    The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1509</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" source="CVE"/>
    <description>
    Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1510</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" source="CVE"/>
    <description>
    The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1511</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1512</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" source="CVE"/>
    <description>
    Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1513</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" source="CVE"/>
    <description>
    TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1514</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" source="CVE"/>
    <description>
    vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1518</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095630" comment="MozillaThunderbird-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095631" comment="MozillaThunderbird-buildsymbols-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095632" comment="MozillaThunderbird-devel-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095633" comment="MozillaThunderbird-translations-common-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095634" comment="MozillaThunderbird-translations-other-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095635" comment="enigmail-1.6.0+24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1519</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1522</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522" source="CVE"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via crafted content.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1523</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" source="CVE"/>
    <description>
    Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095630" comment="MozillaThunderbird-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095631" comment="MozillaThunderbird-buildsymbols-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095632" comment="MozillaThunderbird-devel-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095633" comment="MozillaThunderbird-translations-common-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095634" comment="MozillaThunderbird-translations-other-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095635" comment="enigmail-1.6.0+24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1524</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" source="CVE"/>
    <description>
    The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095630" comment="MozillaThunderbird-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095631" comment="MozillaThunderbird-buildsymbols-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095632" comment="MozillaThunderbird-devel-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095633" comment="MozillaThunderbird-translations-common-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095634" comment="MozillaThunderbird-translations-other-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095635" comment="enigmail-1.6.0+24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1525</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525" source="CVE"/>
    <description>
    The mozilla::dom::TextTrack::AddCue function in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 does not properly perform garbage collection for Text Track Manager variables, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) via a crafted VIDEO element in an HTML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1526</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1528</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1528" source="CVE"/>
    <description>
    The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1529</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" source="CVE"/>
    <description>
    The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095630" comment="MozillaThunderbird-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095631" comment="MozillaThunderbird-buildsymbols-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095632" comment="MozillaThunderbird-devel-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095633" comment="MozillaThunderbird-translations-common-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095634" comment="MozillaThunderbird-translations-other-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095635" comment="enigmail-1.6.0+24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1530</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" source="CVE"/>
    <description>
    The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095630" comment="MozillaThunderbird-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095631" comment="MozillaThunderbird-buildsymbols-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095632" comment="MozillaThunderbird-devel-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095633" comment="MozillaThunderbird-translations-common-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095634" comment="MozillaThunderbird-translations-other-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095635" comment="enigmail-1.6.0+24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1531</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095630" comment="MozillaThunderbird-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095631" comment="MozillaThunderbird-buildsymbols-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095632" comment="MozillaThunderbird-devel-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095633" comment="MozillaThunderbird-translations-common-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095634" comment="MozillaThunderbird-translations-other-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095635" comment="enigmail-1.6.0+24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1532</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095630" comment="MozillaThunderbird-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095631" comment="MozillaThunderbird-buildsymbols-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095632" comment="MozillaThunderbird-devel-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095633" comment="MozillaThunderbird-translations-common-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095634" comment="MozillaThunderbird-translations-other-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095635" comment="enigmail-1.6.0+24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1533</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097165" comment="MozillaThunderbird-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097166" comment="MozillaThunderbird-buildsymbols-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097167" comment="MozillaThunderbird-devel-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097168" comment="MozillaThunderbird-translations-common-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097169" comment="MozillaThunderbird-translations-other-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097170" comment="enigmail-1.6.0+24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1534</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097165" comment="MozillaThunderbird-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097166" comment="MozillaThunderbird-buildsymbols-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097167" comment="MozillaThunderbird-devel-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097168" comment="MozillaThunderbird-translations-common-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097169" comment="MozillaThunderbird-translations-other-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097170" comment="enigmail-1.6.0+24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1536</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536" source="CVE"/>
    <description>
    The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097165" comment="MozillaThunderbird-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097166" comment="MozillaThunderbird-buildsymbols-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097167" comment="MozillaThunderbird-devel-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097168" comment="MozillaThunderbird-translations-common-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097169" comment="MozillaThunderbird-translations-other-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097170" comment="enigmail-1.6.0+24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1537</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097165" comment="MozillaThunderbird-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097166" comment="MozillaThunderbird-buildsymbols-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097167" comment="MozillaThunderbird-devel-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097168" comment="MozillaThunderbird-translations-common-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097169" comment="MozillaThunderbird-translations-other-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097170" comment="enigmail-1.6.0+24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1538</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::CreateMozBR function in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097165" comment="MozillaThunderbird-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097166" comment="MozillaThunderbird-buildsymbols-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097167" comment="MozillaThunderbird-devel-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097168" comment="MozillaThunderbird-translations-common-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097169" comment="MozillaThunderbird-translations-other-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097170" comment="enigmail-1.6.0+24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1539</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1539" source="CVE"/>
    <description>
    Mozilla Firefox before 30.0 and Thunderbird through 24.6 on OS X do not ensure visibility of the cursor after interaction with a Flash object and a DIV element, which makes it easier for remote attackers to conduct clickjacking attacks via JavaScript code that produces a fake cursor image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1540</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::CompileEventHandlerInternal function in the Event Listener Manager in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1541</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097165" comment="MozillaThunderbird-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097166" comment="MozillaThunderbird-buildsymbols-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097167" comment="MozillaThunderbird-devel-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097168" comment="MozillaThunderbird-translations-common-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097169" comment="MozillaThunderbird-translations-other-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097170" comment="enigmail-1.6.0+24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1542</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542" source="CVE"/>
    <description>
    Buffer overflow in the Speex resampler in the Web Audio subsystem in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code via vectors related to a crafted AudioBuffer channel count and sample rate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1543</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1543" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the navigator.getGamepads function in the Gamepad API in Mozilla Firefox before 30.0 allow remote attackers to execute arbitrary code by using non-contiguous axes with a (1) physical or (2) virtual Gamepad device.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1544</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099259" comment="MozillaThunderbird-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099260" comment="MozillaThunderbird-buildsymbols-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099261" comment="MozillaThunderbird-devel-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099262" comment="MozillaThunderbird-translations-common-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099263" comment="MozillaThunderbird-translations-other-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099264" comment="enigmail-1.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1545</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" source="CVE"/>
    <description>
    Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097165" comment="MozillaThunderbird-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097166" comment="MozillaThunderbird-buildsymbols-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097167" comment="MozillaThunderbird-devel-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097168" comment="MozillaThunderbird-translations-common-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097169" comment="MozillaThunderbird-translations-other-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097170" comment="enigmail-1.6.0+24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1547</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099259" comment="MozillaThunderbird-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099260" comment="MozillaThunderbird-buildsymbols-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099261" comment="MozillaThunderbird-devel-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099262" comment="MozillaThunderbird-translations-common-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099263" comment="MozillaThunderbird-translations-other-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099264" comment="enigmail-1.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1548</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099259" comment="MozillaThunderbird-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099260" comment="MozillaThunderbird-buildsymbols-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099261" comment="MozillaThunderbird-devel-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099262" comment="MozillaThunderbird-translations-common-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099263" comment="MozillaThunderbird-translations-other-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099264" comment="enigmail-1.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1549</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549" source="CVE"/>
    <description>
    The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1550</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1552</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 do not properly implement the sandbox attribute of the IFRAME element, which allows remote attackers to bypass intended restrictions on same-origin content via a crafted web site in conjunction with a redirect.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1553</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099944" comment="MozillaFirefox-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099945" comment="MozillaFirefox-branding-upstream-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099946" comment="MozillaFirefox-buildsymbols-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099947" comment="MozillaFirefox-devel-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099948" comment="MozillaFirefox-translations-common-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099949" comment="MozillaFirefox-translations-other-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099950" comment="libfreebl3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099951" comment="libfreebl3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099952" comment="libsoftokn3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099953" comment="libsoftokn3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099954" comment="mozilla-nss-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099955" comment="mozilla-nss-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099956" comment="mozilla-nss-certs-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099957" comment="mozilla-nss-certs-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099958" comment="mozilla-nss-devel-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099959" comment="mozilla-nss-sysinit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099960" comment="mozilla-nss-sysinit-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099961" comment="mozilla-nss-tools-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099962" comment="MozillaThunderbird-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099963" comment="MozillaThunderbird-buildsymbols-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099964" comment="MozillaThunderbird-devel-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099965" comment="MozillaThunderbird-translations-common-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099966" comment="MozillaThunderbird-translations-other-31.1.0-61.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1554</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1555</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099259" comment="MozillaThunderbird-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099260" comment="MozillaThunderbird-buildsymbols-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099261" comment="MozillaThunderbird-devel-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099262" comment="MozillaThunderbird-translations-common-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099263" comment="MozillaThunderbird-translations-other-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099264" comment="enigmail-1.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1556</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099259" comment="MozillaThunderbird-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099260" comment="MozillaThunderbird-buildsymbols-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099261" comment="MozillaThunderbird-devel-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099262" comment="MozillaThunderbird-translations-common-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099263" comment="MozillaThunderbird-translations-other-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099264" comment="enigmail-1.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1557</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" source="CVE"/>
    <description>
    The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099259" comment="MozillaThunderbird-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099260" comment="MozillaThunderbird-buildsymbols-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099261" comment="MozillaThunderbird-devel-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099262" comment="MozillaThunderbird-translations-common-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099263" comment="MozillaThunderbird-translations-other-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099264" comment="enigmail-1.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1558</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1559.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1559</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1558.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1560</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use ASCII character encoding in a required context.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1561</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1562</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099944" comment="MozillaFirefox-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099945" comment="MozillaFirefox-branding-upstream-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099946" comment="MozillaFirefox-buildsymbols-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099947" comment="MozillaFirefox-devel-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099948" comment="MozillaFirefox-translations-common-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099949" comment="MozillaFirefox-translations-other-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099950" comment="libfreebl3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099951" comment="libfreebl3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099952" comment="libsoftokn3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099953" comment="libsoftokn3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099954" comment="mozilla-nss-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099955" comment="mozilla-nss-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099956" comment="mozilla-nss-certs-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099957" comment="mozilla-nss-certs-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099958" comment="mozilla-nss-devel-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099959" comment="mozilla-nss-sysinit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099960" comment="mozilla-nss-sysinit-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099961" comment="mozilla-nss-tools-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099962" comment="MozillaThunderbird-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099963" comment="MozillaThunderbird-buildsymbols-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099964" comment="MozillaThunderbird-devel-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099965" comment="MozillaThunderbird-translations-common-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099966" comment="MozillaThunderbird-translations-other-31.1.0-61.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1563</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099944" comment="MozillaFirefox-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099945" comment="MozillaFirefox-branding-upstream-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099946" comment="MozillaFirefox-buildsymbols-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099947" comment="MozillaFirefox-devel-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099948" comment="MozillaFirefox-translations-common-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099949" comment="MozillaFirefox-translations-other-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099950" comment="libfreebl3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099951" comment="libfreebl3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099952" comment="libsoftokn3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099953" comment="libsoftokn3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099954" comment="mozilla-nss-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099955" comment="mozilla-nss-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099956" comment="mozilla-nss-certs-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099957" comment="mozilla-nss-certs-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099958" comment="mozilla-nss-devel-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099959" comment="mozilla-nss-sysinit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099960" comment="mozilla-nss-sysinit-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099961" comment="mozilla-nss-tools-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099962" comment="MozillaThunderbird-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099963" comment="MozillaThunderbird-buildsymbols-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099964" comment="MozillaThunderbird-devel-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099965" comment="MozillaThunderbird-translations-common-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099966" comment="MozillaThunderbird-translations-other-31.1.0-61.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1564</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564" source="CVE"/>
    <description>
    Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 do not properly initialize memory for GIF rendering, which allows remote attackers to obtain sensitive information from process memory via crafted web script that interacts with a CANVAS element associated with a malformed GIF image.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099944" comment="MozillaFirefox-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099945" comment="MozillaFirefox-branding-upstream-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099946" comment="MozillaFirefox-buildsymbols-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099947" comment="MozillaFirefox-devel-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099948" comment="MozillaFirefox-translations-common-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099949" comment="MozillaFirefox-translations-other-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099950" comment="libfreebl3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099951" comment="libfreebl3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099952" comment="libsoftokn3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099953" comment="libsoftokn3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099954" comment="mozilla-nss-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099955" comment="mozilla-nss-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099956" comment="mozilla-nss-certs-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099957" comment="mozilla-nss-certs-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099958" comment="mozilla-nss-devel-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099959" comment="mozilla-nss-sysinit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099960" comment="mozilla-nss-sysinit-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099961" comment="mozilla-nss-tools-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099962" comment="MozillaThunderbird-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099963" comment="MozillaThunderbird-buildsymbols-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099964" comment="MozillaThunderbird-devel-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099965" comment="MozillaThunderbird-translations-common-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099966" comment="MozillaThunderbird-translations-other-31.1.0-61.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1565</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565" source="CVE"/>
    <description>
    The mozilla::dom::AudioEventTimeline function in the Web Audio API implementation in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 does not properly create audio timelines, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted API calls.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099944" comment="MozillaFirefox-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099945" comment="MozillaFirefox-branding-upstream-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099946" comment="MozillaFirefox-buildsymbols-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099947" comment="MozillaFirefox-devel-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099948" comment="MozillaFirefox-translations-common-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099949" comment="MozillaFirefox-translations-other-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099950" comment="libfreebl3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099951" comment="libfreebl3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099952" comment="libsoftokn3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099953" comment="libsoftokn3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099954" comment="mozilla-nss-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099955" comment="mozilla-nss-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099956" comment="mozilla-nss-certs-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099957" comment="mozilla-nss-certs-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099958" comment="mozilla-nss-devel-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099959" comment="mozilla-nss-sysinit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099960" comment="mozilla-nss-sysinit-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099961" comment="mozilla-nss-tools-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099962" comment="MozillaThunderbird-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099963" comment="MozillaThunderbird-buildsymbols-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099964" comment="MozillaThunderbird-devel-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099965" comment="MozillaThunderbird-translations-common-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099966" comment="MozillaThunderbird-translations-other-31.1.0-61.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1567</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" source="CVE"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099944" comment="MozillaFirefox-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099945" comment="MozillaFirefox-branding-upstream-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099946" comment="MozillaFirefox-buildsymbols-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099947" comment="MozillaFirefox-devel-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099948" comment="MozillaFirefox-translations-common-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099949" comment="MozillaFirefox-translations-other-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099950" comment="libfreebl3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099951" comment="libfreebl3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099952" comment="libsoftokn3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099953" comment="libsoftokn3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099954" comment="mozilla-nss-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099955" comment="mozilla-nss-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099956" comment="mozilla-nss-certs-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099957" comment="mozilla-nss-certs-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099958" comment="mozilla-nss-devel-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099959" comment="mozilla-nss-sysinit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099960" comment="mozilla-nss-sysinit-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099961" comment="mozilla-nss-tools-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099962" comment="MozillaThunderbird-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099963" comment="MozillaThunderbird-buildsymbols-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099964" comment="MozillaThunderbird-devel-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099965" comment="MozillaThunderbird-translations-common-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099966" comment="MozillaThunderbird-translations-other-31.1.0-61.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1568</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100758" comment="libfreebl3-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100759" comment="libfreebl3-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100760" comment="libsoftokn3-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100761" comment="libsoftokn3-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100762" comment="mozilla-nss-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100763" comment="mozilla-nss-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100764" comment="mozilla-nss-certs-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100765" comment="mozilla-nss-certs-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100766" comment="mozilla-nss-devel-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100767" comment="mozilla-nss-sysinit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100768" comment="mozilla-nss-sysinit-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100769" comment="mozilla-nss-tools-3.16.5-1.55.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1574</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101103" comment="MozillaThunderbird-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101104" comment="MozillaThunderbird-buildsymbols-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101105" comment="MozillaThunderbird-devel-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101106" comment="MozillaThunderbird-translations-common-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101107" comment="MozillaThunderbird-translations-other-31.2.0-61.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1575</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1576</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101103" comment="MozillaThunderbird-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101104" comment="MozillaThunderbird-buildsymbols-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101105" comment="MozillaThunderbird-devel-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101106" comment="MozillaThunderbird-translations-common-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101107" comment="MozillaThunderbird-translations-other-31.2.0-61.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1577</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" source="CVE"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101103" comment="MozillaThunderbird-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101104" comment="MozillaThunderbird-buildsymbols-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101105" comment="MozillaThunderbird-devel-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101106" comment="MozillaThunderbird-translations-common-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101107" comment="MozillaThunderbird-translations-other-31.2.0-61.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1578</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" source="CVE"/>
    <description>
    The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101103" comment="MozillaThunderbird-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101104" comment="MozillaThunderbird-buildsymbols-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101105" comment="MozillaThunderbird-devel-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101106" comment="MozillaThunderbird-translations-common-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101107" comment="MozillaThunderbird-translations-other-31.2.0-61.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1580</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580" source="CVE"/>
    <description>
    Mozilla Firefox before 33.0 does not properly initialize memory for GIF images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers a sequence of rendering operations for truncated GIF data within a CANVAS element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1581</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" source="CVE"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101103" comment="MozillaThunderbird-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101104" comment="MozillaThunderbird-buildsymbols-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101105" comment="MozillaThunderbird-devel-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101106" comment="MozillaThunderbird-translations-common-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101107" comment="MozillaThunderbird-translations-other-31.2.0-61.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1582</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1582" source="CVE"/>
    <description>
    The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1583</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" source="CVE"/>
    <description>
    The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1584</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1584" source="CVE"/>
    <description>
    The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1585</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" source="CVE"/>
    <description>
    The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote attackers to obtain sensitive information from the local camera by maintaining a session after the user tries to discontinue streaming.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101103" comment="MozillaThunderbird-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101104" comment="MozillaThunderbird-buildsymbols-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101105" comment="MozillaThunderbird-devel-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101106" comment="MozillaThunderbird-translations-common-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101107" comment="MozillaThunderbird-translations-other-31.2.0-61.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1586</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" source="CVE"/>
    <description>
    content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101103" comment="MozillaThunderbird-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101104" comment="MozillaThunderbird-buildsymbols-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101105" comment="MozillaThunderbird-devel-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101106" comment="MozillaThunderbird-translations-common-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101107" comment="MozillaThunderbird-translations-other-31.2.0-61.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1587</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102508" comment="MozillaFirefox-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102509" comment="MozillaFirefox-branding-upstream-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102510" comment="MozillaFirefox-buildsymbols-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102511" comment="MozillaFirefox-devel-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102512" comment="MozillaFirefox-translations-common-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102513" comment="MozillaFirefox-translations-other-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102514" comment="mozilla-nspr-32bit-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102515" comment="mozilla-nspr-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102516" comment="mozilla-nspr-devel-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102517" comment="libfreebl3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102518" comment="libfreebl3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102519" comment="libsoftokn3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102520" comment="libsoftokn3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102521" comment="mozilla-nss-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102522" comment="mozilla-nss-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102523" comment="mozilla-nss-certs-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102524" comment="mozilla-nss-certs-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102525" comment="mozilla-nss-devel-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102526" comment="mozilla-nss-sysinit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102527" comment="mozilla-nss-sysinit-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102528" comment="mozilla-nss-tools-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102901" comment="MozillaThunderbird-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102902" comment="MozillaThunderbird-buildsymbols-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102903" comment="MozillaThunderbird-devel-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102904" comment="MozillaThunderbird-translations-common-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102905" comment="MozillaThunderbird-translations-other-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102906" comment="seamonkey-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102907" comment="seamonkey-dom-inspector-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102908" comment="seamonkey-irc-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102909" comment="seamonkey-translations-common-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102910" comment="seamonkey-translations-other-2.31-1.65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1588</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102508" comment="MozillaFirefox-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102509" comment="MozillaFirefox-branding-upstream-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102510" comment="MozillaFirefox-buildsymbols-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102511" comment="MozillaFirefox-devel-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102512" comment="MozillaFirefox-translations-common-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102513" comment="MozillaFirefox-translations-other-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102514" comment="mozilla-nspr-32bit-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102515" comment="mozilla-nspr-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102516" comment="mozilla-nspr-devel-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102517" comment="libfreebl3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102518" comment="libfreebl3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102519" comment="libsoftokn3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102520" comment="libsoftokn3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102521" comment="mozilla-nss-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102522" comment="mozilla-nss-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102523" comment="mozilla-nss-certs-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102524" comment="mozilla-nss-certs-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102525" comment="mozilla-nss-devel-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102526" comment="mozilla-nss-sysinit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102527" comment="mozilla-nss-sysinit-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102528" comment="mozilla-nss-tools-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102906" comment="seamonkey-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102907" comment="seamonkey-dom-inspector-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102908" comment="seamonkey-irc-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102909" comment="seamonkey-translations-common-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102910" comment="seamonkey-translations-other-2.31-1.65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1589</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589" source="CVE"/>
    <description>
    Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102508" comment="MozillaFirefox-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102509" comment="MozillaFirefox-branding-upstream-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102510" comment="MozillaFirefox-buildsymbols-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102511" comment="MozillaFirefox-devel-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102512" comment="MozillaFirefox-translations-common-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102513" comment="MozillaFirefox-translations-other-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102514" comment="mozilla-nspr-32bit-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102515" comment="mozilla-nspr-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102516" comment="mozilla-nspr-devel-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102517" comment="libfreebl3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102518" comment="libfreebl3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102519" comment="libsoftokn3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102520" comment="libsoftokn3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102521" comment="mozilla-nss-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102522" comment="mozilla-nss-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102523" comment="mozilla-nss-certs-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102524" comment="mozilla-nss-certs-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102525" comment="mozilla-nss-devel-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102526" comment="mozilla-nss-sysinit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102527" comment="mozilla-nss-sysinit-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102528" comment="mozilla-nss-tools-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102906" comment="seamonkey-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102907" comment="seamonkey-dom-inspector-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102908" comment="seamonkey-irc-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102909" comment="seamonkey-translations-common-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102910" comment="seamonkey-translations-other-2.31-1.65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1590</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" source="CVE"/>
    <description>
    The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102508" comment="MozillaFirefox-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102509" comment="MozillaFirefox-branding-upstream-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102510" comment="MozillaFirefox-buildsymbols-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102511" comment="MozillaFirefox-devel-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102512" comment="MozillaFirefox-translations-common-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102513" comment="MozillaFirefox-translations-other-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102514" comment="mozilla-nspr-32bit-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102515" comment="mozilla-nspr-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102516" comment="mozilla-nspr-devel-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102517" comment="libfreebl3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102518" comment="libfreebl3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102519" comment="libsoftokn3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102520" comment="libsoftokn3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102521" comment="mozilla-nss-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102522" comment="mozilla-nss-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102523" comment="mozilla-nss-certs-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102524" comment="mozilla-nss-certs-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102525" comment="mozilla-nss-devel-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102526" comment="mozilla-nss-sysinit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102527" comment="mozilla-nss-sysinit-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102528" comment="mozilla-nss-tools-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102901" comment="MozillaThunderbird-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102902" comment="MozillaThunderbird-buildsymbols-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102903" comment="MozillaThunderbird-devel-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102904" comment="MozillaThunderbird-translations-common-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102905" comment="MozillaThunderbird-translations-other-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102906" comment="seamonkey-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102907" comment="seamonkey-dom-inspector-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102908" comment="seamonkey-irc-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102909" comment="seamonkey-translations-common-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102910" comment="seamonkey-translations-other-2.31-1.65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1591</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591" source="CVE"/>
    <description>
    Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102508" comment="MozillaFirefox-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102509" comment="MozillaFirefox-branding-upstream-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102510" comment="MozillaFirefox-buildsymbols-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102511" comment="MozillaFirefox-devel-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102512" comment="MozillaFirefox-translations-common-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102513" comment="MozillaFirefox-translations-other-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102514" comment="mozilla-nspr-32bit-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102515" comment="mozilla-nspr-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102516" comment="mozilla-nspr-devel-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102517" comment="libfreebl3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102518" comment="libfreebl3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102519" comment="libsoftokn3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102520" comment="libsoftokn3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102521" comment="mozilla-nss-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102522" comment="mozilla-nss-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102523" comment="mozilla-nss-certs-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102524" comment="mozilla-nss-certs-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102525" comment="mozilla-nss-devel-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102526" comment="mozilla-nss-sysinit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102527" comment="mozilla-nss-sysinit-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102528" comment="mozilla-nss-tools-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102906" comment="seamonkey-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102907" comment="seamonkey-dom-inspector-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102908" comment="seamonkey-irc-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102909" comment="seamonkey-translations-common-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102910" comment="seamonkey-translations-other-2.31-1.65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1592</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102508" comment="MozillaFirefox-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102509" comment="MozillaFirefox-branding-upstream-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102510" comment="MozillaFirefox-buildsymbols-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102511" comment="MozillaFirefox-devel-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102512" comment="MozillaFirefox-translations-common-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102513" comment="MozillaFirefox-translations-other-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102514" comment="mozilla-nspr-32bit-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102515" comment="mozilla-nspr-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102516" comment="mozilla-nspr-devel-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102517" comment="libfreebl3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102518" comment="libfreebl3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102519" comment="libsoftokn3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102520" comment="libsoftokn3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102521" comment="mozilla-nss-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102522" comment="mozilla-nss-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102523" comment="mozilla-nss-certs-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102524" comment="mozilla-nss-certs-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102525" comment="mozilla-nss-devel-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102526" comment="mozilla-nss-sysinit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102527" comment="mozilla-nss-sysinit-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102528" comment="mozilla-nss-tools-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102901" comment="MozillaThunderbird-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102902" comment="MozillaThunderbird-buildsymbols-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102903" comment="MozillaThunderbird-devel-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102904" comment="MozillaThunderbird-translations-common-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102905" comment="MozillaThunderbird-translations-other-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102906" comment="seamonkey-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102907" comment="seamonkey-dom-inspector-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102908" comment="seamonkey-irc-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102909" comment="seamonkey-translations-common-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102910" comment="seamonkey-translations-other-2.31-1.65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1593</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" source="CVE"/>
    <description>
    Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102508" comment="MozillaFirefox-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102509" comment="MozillaFirefox-branding-upstream-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102510" comment="MozillaFirefox-buildsymbols-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102511" comment="MozillaFirefox-devel-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102512" comment="MozillaFirefox-translations-common-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102513" comment="MozillaFirefox-translations-other-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102514" comment="mozilla-nspr-32bit-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102515" comment="mozilla-nspr-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102516" comment="mozilla-nspr-devel-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102517" comment="libfreebl3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102518" comment="libfreebl3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102519" comment="libsoftokn3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102520" comment="libsoftokn3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102521" comment="mozilla-nss-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102522" comment="mozilla-nss-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102523" comment="mozilla-nss-certs-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102524" comment="mozilla-nss-certs-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102525" comment="mozilla-nss-devel-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102526" comment="mozilla-nss-sysinit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102527" comment="mozilla-nss-sysinit-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102528" comment="mozilla-nss-tools-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102901" comment="MozillaThunderbird-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102902" comment="MozillaThunderbird-buildsymbols-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102903" comment="MozillaThunderbird-devel-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102904" comment="MozillaThunderbird-translations-common-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102905" comment="MozillaThunderbird-translations-other-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102906" comment="seamonkey-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102907" comment="seamonkey-dom-inspector-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102908" comment="seamonkey-irc-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102909" comment="seamonkey-translations-common-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102910" comment="seamonkey-translations-other-2.31-1.65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1594</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" source="CVE"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102508" comment="MozillaFirefox-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102509" comment="MozillaFirefox-branding-upstream-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102510" comment="MozillaFirefox-buildsymbols-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102511" comment="MozillaFirefox-devel-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102512" comment="MozillaFirefox-translations-common-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102513" comment="MozillaFirefox-translations-other-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102514" comment="mozilla-nspr-32bit-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102515" comment="mozilla-nspr-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102516" comment="mozilla-nspr-devel-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102517" comment="libfreebl3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102518" comment="libfreebl3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102519" comment="libsoftokn3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102520" comment="libsoftokn3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102521" comment="mozilla-nss-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102522" comment="mozilla-nss-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102523" comment="mozilla-nss-certs-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102524" comment="mozilla-nss-certs-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102525" comment="mozilla-nss-devel-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102526" comment="mozilla-nss-sysinit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102527" comment="mozilla-nss-sysinit-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102528" comment="mozilla-nss-tools-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102901" comment="MozillaThunderbird-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102902" comment="MozillaThunderbird-buildsymbols-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102903" comment="MozillaThunderbird-devel-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102904" comment="MozillaThunderbird-translations-common-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102905" comment="MozillaThunderbird-translations-other-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102906" comment="seamonkey-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102907" comment="seamonkey-dom-inspector-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102908" comment="seamonkey-irc-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102909" comment="seamonkey-translations-common-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102910" comment="seamonkey-translations-other-2.31-1.65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1642</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642" source="CVE"/>
    <description>
    The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1666</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666" source="CVE"/>
    <description>
    The do_physdev_op function in Xen 4.1.5, 4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict access to the (1) PHYSDEVOP_prepare_msix and (2) PHYSDEVOP_release_msix operations, which allows local PV guests to cause a denial of service (host or guest malfunction) or possibly gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1690</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1690" source="CVE"/>
    <description>
    The help function in net/netfilter/nf_nat_irc.c in the Linux kernel before 3.12.8 allows remote attackers to obtain sensitive information from kernel memory by establishing an IRC DCC session in which incorrect packet data is transmitted during use of the NAT mangle feature.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1695</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1695" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) 3.1.x before 3.1.20, 3.2.x before 3.2.15, and 3.3.x before 3.3.5 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML email.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094116" comment="otrs-3.1.20-26.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094117" comment="otrs-doc-3.1.20-26.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094118" comment="otrs-itsm-3.1.10-26.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1700</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1700" source="CVE"/>
    <description>
    Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1701</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1701" source="CVE"/>
    <description>
    The GenerateFunction function in bindings/scripts/code_generator_v8.pm in Blink, as used in Google Chrome before 33.0.1750.149, does not implement a certain cross-origin restriction for the EventTarget::dispatchEvent function, which allows remote attackers to conduct Universal XSS (UXSS) attacks via vectors involving events.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1702</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1702" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DatabaseThread::cleanupDatabaseThread function in modules/webdatabase/DatabaseThread.cpp in the web database implementation in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of scheduled tasks during shutdown of a thread.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1703</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1703" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebSocketDispatcherHost::SendOrDrop function in content/browser/renderer_host/websocket_dispatcher_host.cc in the Web Sockets implementation in Google Chrome before 33.0.1750.149 might allow remote attackers to bypass the sandbox protection mechanism by leveraging an incorrect deletion in a certain failure case.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1704</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1704" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1705</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1705" source="CVE"/>
    <description>
    Google V8, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1713</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1713" source="CVE"/>
    <description>
    Use-after-free vulnerability in the AttributeSetter function in bindings/templates/attributes.cpp in the bindings in Blink, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the document.location value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1714</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1714" source="CVE"/>
    <description>
    The ScopedClipboardWriter::WritePickledData function in ui/base/clipboard/scoped_clipboard_writer.cc in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows does not verify a certain format value, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the clipboard.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1715</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1715" source="CVE"/>
    <description>
    Directory traversal vulnerability in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows has unspecified impact and attack vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1716</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1716" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the Runtime_SetPrototype function in runtime.cc in Google V8, as used in Google Chrome before 34.0.1847.116, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1717</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1717" source="CVE"/>
    <description>
    Google V8, as used in Google Chrome before 34.0.1847.116, does not properly use numeric casts during handling of typed arrays, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1718</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1718" source="CVE"/>
    <description>
    Integer overflow in the SoftwareFrameManager::SwapToNewFrame function in content/browser/renderer_host/software_frame_manager.cc in the software compositor in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted mapping of a large amount of renderer memory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1719</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1719" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebSharedWorkerStub::OnTerminateWorkerContext function in content/worker/websharedworker_stub.cc in the Web Workers implementation in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger a SharedWorker termination during script loading.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1720</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1720" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTMLBodyElement::insertedInto function in core/html/HTMLBodyElement.cpp in Blink, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving attributes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1721</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1721" source="CVE"/>
    <description>
    Google V8, as used in Google Chrome before 34.0.1847.116, does not properly implement lazy deoptimization, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by improper handling of a heap allocation of a number outside the Small Integer (aka smi) range.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1722</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1722" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RenderBlock::addChildIgnoringAnonymousColumnBlocks function in core/rendering/RenderBlock.cpp in Blink, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving addition of a child node.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1723</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1723" source="CVE"/>
    <description>
    The UnescapeURLWithOffsetsImpl function in net/base/escape.cc in Google Chrome before 34.0.1847.116 does not properly handle bidirectional Internationalized Resource Identifiers (IRIs), which makes it easier for remote attackers to spoof URLs via crafted use of right-to-left (RTL) Unicode text.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1724</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1724" source="CVE"/>
    <description>
    Use-after-free vulnerability in Free(b)soft Laboratory Speech Dispatcher 0.7.1, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service (application hang) or possibly have unspecified other impact via a text-to-speech request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1725</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1725" source="CVE"/>
    <description>
    The base64DecodeInternal function in wtf/text/Base64.cpp in Blink, as used in Google Chrome before 34.0.1847.116, does not properly handle string data composed exclusively of whitespace characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via a window.atob method call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1726</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1726" source="CVE"/>
    <description>
    The drag implementation in Google Chrome before 34.0.1847.116 allows user-assisted remote attackers to bypass the Same Origin Policy and forge local pathnames by leveraging renderer access.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1727</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1727" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/renderer/renderer_webcolorchooser_impl.h in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to forms.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1728</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1728" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 34.0.1847.116 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1729</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1729" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google V8 before 3.24.35.22, as used in Google Chrome before 34.0.1847.116, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1730</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1730" source="CVE"/>
    <description>
    Google V8, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly store internationalization metadata, which allows remote attackers to bypass intended access restrictions by leveraging "type confusion" and reading property values, related to i18n.js and runtime.cc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095743" comment="chromedriver-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095744" comment="chromium-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095745" comment="chromium-desktop-gnome-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095746" comment="chromium-desktop-kde-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095747" comment="chromium-ffmpegsumo-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095748" comment="chromium-suid-helper-34.0.1847.132-1.41.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1731</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1731" source="CVE"/>
    <description>
    core/html/HTMLSelectElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly check renderer state upon a focus event, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095743" comment="chromedriver-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095744" comment="chromium-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095745" comment="chromium-desktop-gnome-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095746" comment="chromium-desktop-kde-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095747" comment="chromium-ffmpegsumo-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095748" comment="chromium-suid-helper-34.0.1847.132-1.41.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1732</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1732" source="CVE"/>
    <description>
    Use-after-free vulnerability in browser/ui/views/speech_recognition_bubble_views.cc in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via an INPUT element that triggers the presence of a Speech Recognition Bubble window for an incorrect duration.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095743" comment="chromedriver-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095744" comment="chromium-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095745" comment="chromium-desktop-gnome-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095746" comment="chromium-desktop-kde-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095747" comment="chromium-ffmpegsumo-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095748" comment="chromium-suid-helper-34.0.1847.132-1.41.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1733</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1733" source="CVE"/>
    <description>
    The PointerCompare function in codegen.cc in Seccomp-BPF, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly merge blocks, which might allow remote attackers to bypass intended sandbox restrictions by leveraging renderer access.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095743" comment="chromedriver-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095744" comment="chromium-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095745" comment="chromium-desktop-gnome-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095746" comment="chromium-desktop-kde-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095747" comment="chromium-ffmpegsumo-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095748" comment="chromium-suid-helper-34.0.1847.132-1.41.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1734</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1734" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095743" comment="chromedriver-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095744" comment="chromium-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095745" comment="chromium-desktop-gnome-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095746" comment="chromium-desktop-kde-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095747" comment="chromium-ffmpegsumo-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095748" comment="chromium-suid-helper-34.0.1847.132-1.41.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1735</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1735" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google V8 before 3.24.35.33, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095743" comment="chromedriver-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095744" comment="chromium-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095745" comment="chromium-desktop-gnome-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095746" comment="chromium-desktop-kde-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095747" comment="chromium-ffmpegsumo-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095748" comment="chromium-suid-helper-34.0.1847.132-1.41.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1737</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" source="CVE"/>
    <description>
    The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1738</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" source="CVE"/>
    <description>
    The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1740</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1740" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in net/websockets/websocket_job.cc in the WebSockets implementation in Google Chrome before 34.0.1847.137 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to WebSocketJob deletion.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1741</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1741" source="CVE"/>
    <description>
    Multiple integer overflows in the replace-data functionality in the CharacterData interface implementation in core/dom/CharacterData.cpp in Blink, as used in Google Chrome before 34.0.1847.137, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to ranges.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1742</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1742" source="CVE"/>
    <description>
    Use-after-free vulnerability in the FrameSelection::updateAppearance function in core/editing/FrameSelection.cpp in Blink, as used in Google Chrome before 34.0.1847.137, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper RenderObject handling.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1743</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1743" source="CVE"/>
    <description>
    Use-after-free vulnerability in the StyleElement::removedFromDocument function in core/dom/StyleElement.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code that triggers tree mutation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1744</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1744" source="CVE"/>
    <description>
    Integer overflow in the AudioInputRendererHost::OnCreateStream function in content/browser/renderer_host/media/audio_input_renderer_host.cc in Google Chrome before 35.0.1916.114 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large shared-memory allocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1745</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger removal of an SVGFontFaceElement object, related to core/svg/SVGFontFaceElement.cpp.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1746</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1746" source="CVE"/>
    <description>
    The InMemoryUrlProtocol::Read function in media/filters/in_memory_url_protocol.cc in Google Chrome before 35.0.1916.114 relies on an insufficiently large integer data type, which allows remote attackers to cause a denial of service (out-of-bounds read) via vectors that trigger use of a large buffer.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1747</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1747" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the DocumentLoader::maybeCreateArchive function in core/loader/DocumentLoader.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to inject arbitrary web script or HTML via crafted MHTML content, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1748</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748" source="CVE"/>
    <description>
    The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1749</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1749" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 35.0.1916.114 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1838</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1838" source="CVE"/>
    <description>
    The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093693" comment="python-logilab-common-0.58.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093694" comment="python3-logilab-common-0.58.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1839</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1839" source="CVE"/>
    <description>
    The Execute class in shellutils in logilab-commons before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093693" comment="python-logilab-common-0.58.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093694" comment="python3-logilab-common-0.58.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1874</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874" source="CVE"/>
    <description>
    The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1876</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" source="CVE"/>
    <description>
    The unpacker::redirect_stdio function in unpack.cpp in unpack200 in OpenJDK 6, 7, and 8; Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 does not securely create temporary files when a log file cannot be opened, which allows local users to overwrite arbitrary files via a symlink attack on /tmp/unpack.log.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1878</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1878" source="CVE"/>
    <description>
    Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094900" comment="nagios-3.5.0-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094901" comment="nagios-devel-3.5.0-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094902" comment="nagios-www-3.5.0-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094903" comment="nagios-www-dch-3.5.0-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1879</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in import.php in phpMyAdmin before 4.1.7 allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename in an import action.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094013" comment="phpMyAdmin-4.1.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1891</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1892, CVE-2014-1893, and CVE-2014-1894.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1892</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892" source="CVE"/>
    <description>
    Xen 3.3 through 4.1, when XSM is enabled, allows local users to cause a denial of service via vectors related to a "large memory allocation," a different vulnerability than CVE-2014-1891, CVE-2014-1893, and CVE-2014-1894.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1893</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) FLASK_GETBOOL and (2) FLASK_SETBOOL suboperations in the flask hypercall in Xen 4.1.x, 3.3.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1894.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1894</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894" source="CVE"/>
    <description>
    Multiple integer overflows in unspecified suboperations in the flask hypercall in Xen 3.2.x and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1893.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1895</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895" source="CVE"/>
    <description>
    Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1896</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896" source="CVE"/>
    <description>
    The (1) do_send and (2) do_recv functions in io.c in libvchan in Xen 4.2.x, 4.3.x, and 4.4-RC series allows local guests to cause a denial of service or possibly gain privileges via crafted xenstore ring indexes, which triggers a "read or write past the end of the ring."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1909</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1909" source="CVE"/>
    <description>
    Integer signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095553" comment="android-tools-4.2.1_r1-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1912</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912" source="CVE"/>
    <description>
    Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094907" comment="libpython2_7-1_0-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094908" comment="libpython2_7-1_0-32bit-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094909" comment="python-base-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094910" comment="python-base-32bit-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094911" comment="python-devel-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094912" comment="python-xml-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094913" comment="python-doc-2.7-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094914" comment="python-doc-pdf-2.7-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094915" comment="python-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094916" comment="python-32bit-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094917" comment="python-curses-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094918" comment="python-demo-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094919" comment="python-gdbm-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094920" comment="python-idle-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094921" comment="python-tk-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095335" comment="libpython3_3m1_0-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095336" comment="libpython3_3m1_0-32bit-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095337" comment="python3-base-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095338" comment="python3-base-32bit-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095339" comment="python3-devel-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095340" comment="python3-idle-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095341" comment="python3-testsuite-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095342" comment="python3-tools-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095343" comment="python3-doc-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095344" comment="python3-doc-pdf-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095345" comment="python3-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095346" comment="python3-32bit-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095347" comment="python3-curses-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095348" comment="python3-dbm-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095349" comment="python3-tk-3.3.0-6.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1932</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932" source="CVE"/>
    <description>
    The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095364" comment="python-imaging-1.1.7-15.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095365" comment="python-imaging-sane-1.1.7-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1933</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933" source="CVE"/>
    <description>
    The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095364" comment="python-imaging-1.1.7-15.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095365" comment="python-imaging-sane-1.1.7-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1934</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1934" source="CVE"/>
    <description>
    tag.py in eyeD3 (aka python-eyed3) 7.0.3, 0.6.18, and earlier for Python allows local users to modify arbitrary files via a symlink attack on a temporary file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095507" comment="python-eyeD3-0.6.18-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1943</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943" source="CVE"/>
    <description>
    Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094178" comment="file-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094179" comment="file-devel-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094180" comment="libmagic-data-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094181" comment="libmagic1-32bit-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094182" comment="libmagic1-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094183" comment="python-magic-5.11-12.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1950</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" source="CVE"/>
    <description>
    Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1958</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1958" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094363" comment="ImageMagick-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094364" comment="ImageMagick-devel-32bit-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094365" comment="ImageMagick-devel-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094366" comment="ImageMagick-doc-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094367" comment="ImageMagick-extra-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094368" comment="libMagick++-devel-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094369" comment="libMagick++5-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094370" comment="libMagickCore5-32bit-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094371" comment="libMagickCore5-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094372" comment="libMagickWand5-32bit-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094373" comment="libMagickWand5-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094374" comment="perl-PerlMagick-6.7.8.8-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2015</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015" source="CVE"/>
    <description>
    Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094014" comment="freeradius-server-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094015" comment="freeradius-server-devel-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094016" comment="freeradius-server-dialupadmin-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094017" comment="freeradius-server-doc-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094018" comment="freeradius-server-libs-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094019" comment="freeradius-server-utils-2.2.0-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2029</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2029" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094119" comment="percona-toolkit-2.1.11-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2030</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2030" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094363" comment="ImageMagick-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094364" comment="ImageMagick-devel-32bit-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094365" comment="ImageMagick-devel-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094366" comment="ImageMagick-doc-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094367" comment="ImageMagick-extra-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094368" comment="libMagick++-devel-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094369" comment="libMagick++5-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094370" comment="libMagickCore5-32bit-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094371" comment="libMagickCore5-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094372" comment="libMagickWand5-32bit-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094373" comment="libMagickWand5-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094374" comment="perl-PerlMagick-6.7.8.8-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2270</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270" source="CVE"/>
    <description>
    softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094178" comment="file-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094179" comment="file-devel-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094180" comment="libmagic-data-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094181" comment="libmagic1-32bit-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094182" comment="libmagic1-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094183" comment="python-magic-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094471" comment="file-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094472" comment="file-devel-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094473" comment="libmagic-data-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094474" comment="libmagic1-32bit-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094475" comment="libmagic1-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094476" comment="python-magic-5.11-12.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2281</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" source="CVE"/>
    <description>
    The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094184" comment="wireshark-1.8.13-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094185" comment="wireshark-devel-1.8.13-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2282</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282" source="CVE"/>
    <description>
    The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094184" comment="wireshark-1.8.13-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094185" comment="wireshark-devel-1.8.13-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2283</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" source="CVE"/>
    <description>
    epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094184" comment="wireshark-1.8.13-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094185" comment="wireshark-devel-1.8.13-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2284</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2284" source="CVE"/>
    <description>
    The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094229" comment="libsnmp30-32bit-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094230" comment="libsnmp30-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094231" comment="net-snmp-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094232" comment="net-snmp-devel-32bit-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094233" comment="net-snmp-devel-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094234" comment="perl-SNMP-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094235" comment="snmp-mibs-5.7.2-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2285</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2285" source="CVE"/>
    <description>
    The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094229" comment="libsnmp30-32bit-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094230" comment="libsnmp30-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094231" comment="net-snmp-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094232" comment="net-snmp-devel-32bit-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094233" comment="net-snmp-devel-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094234" comment="perl-SNMP-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094235" comment="snmp-mibs-5.7.2-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2299</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" source="CVE"/>
    <description>
    Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094184" comment="wireshark-1.8.13-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094185" comment="wireshark-devel-1.8.13-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2309</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2309" source="CVE"/>
    <description>
    The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2323</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2323" source="CVE"/>
    <description>
    SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094485" comment="lighttpd-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094486" comment="lighttpd-mod_cml-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094487" comment="lighttpd-mod_geoip-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094488" comment="lighttpd-mod_magnet-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094489" comment="lighttpd-mod_mysql_vhost-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094490" comment="lighttpd-mod_rrdtool-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094491" comment="lighttpd-mod_trigger_b4_dl-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094492" comment="lighttpd-mod_webdav-1.4.35-6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2324</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2324" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd before 1.4.35 allow remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094485" comment="lighttpd-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094486" comment="lighttpd-mod_cml-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094487" comment="lighttpd-mod_geoip-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094488" comment="lighttpd-mod_magnet-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094489" comment="lighttpd-mod_mysql_vhost-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094490" comment="lighttpd-mod_rrdtool-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094491" comment="lighttpd-mod_trigger_b4_dl-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094492" comment="lighttpd-mod_webdav-1.4.35-6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2326</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2326" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in cdef.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to inject arbitrary web  script or HTML via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095356" comment="cacti-spine-0.8.8b-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095357" comment="cacti-0.8.8b-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2328</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2328" source="CVE"/>
    <description>
    lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095356" comment="cacti-spine-0.8.8b-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095357" comment="cacti-0.8.8b-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2338</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2338" source="CVE"/>
    <description>
    IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096013" comment="strongswan-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096014" comment="strongswan-doc-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096015" comment="strongswan-ipsec-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096016" comment="strongswan-libs0-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096017" comment="strongswan-mysql-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096018" comment="strongswan-nm-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096019" comment="strongswan-sqlite-5.0.1-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2386</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2386" source="CVE"/>
    <description>
    Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094430" comment="icinga-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094431" comment="icinga-devel-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094432" comment="icinga-doc-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094433" comment="icinga-idoutils-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094434" comment="icinga-idoutils-mysql-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094435" comment="icinga-idoutils-oracle-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094436" comment="icinga-idoutils-pgsql-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094437" comment="icinga-plugins-downtimes-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094438" comment="icinga-plugins-eventhandlers-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094439" comment="icinga-www-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094440" comment="monitoring-tools-1.10.2-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2397</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2398</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2402</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-0455.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2403</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2412</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, SE 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-0451.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2413</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2414</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXB.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2421</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2423</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2427</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2483</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2483" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u60 and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-4223. NOTE: the previous information is from the July 2014 CPU. Oracle has not commented on another vendor's claim that the issue is related to improper restriction of the "use of privileged annotations."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2490</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2490" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 7u60 and SE 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2497</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" source="CVE"/>
    <description>
    The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096503" comment="apache2-mod_php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096504" comment="php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096505" comment="php5-bcmath-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096506" comment="php5-bz2-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096507" comment="php5-calendar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096508" comment="php5-ctype-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096509" comment="php5-curl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096510" comment="php5-dba-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096511" comment="php5-devel-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096512" comment="php5-dom-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096513" comment="php5-enchant-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096514" comment="php5-exif-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096515" comment="php5-fastcgi-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096516" comment="php5-fileinfo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096517" comment="php5-fpm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096518" comment="php5-ftp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096519" comment="php5-gd-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096520" comment="php5-gettext-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096521" comment="php5-gmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096522" comment="php5-iconv-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096523" comment="php5-imap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096524" comment="php5-intl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096525" comment="php5-json-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096526" comment="php5-ldap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096527" comment="php5-mbstring-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096528" comment="php5-mcrypt-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096529" comment="php5-mssql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096530" comment="php5-mysql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096531" comment="php5-odbc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096532" comment="php5-openssl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096533" comment="php5-pcntl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096534" comment="php5-pdo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096535" comment="php5-pear-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096536" comment="php5-pgsql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096537" comment="php5-phar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096538" comment="php5-posix-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096539" comment="php5-pspell-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096540" comment="php5-readline-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096541" comment="php5-shmop-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096542" comment="php5-snmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096543" comment="php5-soap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096544" comment="php5-sockets-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096545" comment="php5-sqlite-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096546" comment="php5-suhosin-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096547" comment="php5-sysvmsg-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096548" comment="php5-sysvsem-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096549" comment="php5-sysvshm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096550" comment="php5-tidy-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096551" comment="php5-tokenizer-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096552" comment="php5-wddx-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096553" comment="php5-xmlreader-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096554" comment="php5-xmlrpc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096555" comment="php5-xmlwriter-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096556" comment="php5-xsl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096557" comment="php5-zip-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096558" comment="php5-zlib-5.3.17-3.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2523</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523" source="CVE"/>
    <description>
    net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2524</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2524" source="CVE"/>
    <description>
    The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100748" comment="bash-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100749" comment="bash-devel-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100750" comment="bash-doc-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100751" comment="bash-lang-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100752" comment="bash-loadables-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100753" comment="libreadline6-32bit-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100754" comment="libreadline6-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100755" comment="readline-devel-32bit-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100756" comment="readline-devel-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100757" comment="readline-doc-6.2-61.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2525</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525" source="CVE"/>
    <description>
    Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094859" comment="libyaml-0-2-0.1.3-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094860" comment="libyaml-0.1.3-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094861" comment="libyaml-devel-0.1.3-11.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2538</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2538" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in lib/rack/ssl.rb in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094905" comment="rubygem-rack-ssl-1.3.2-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094906" comment="rubygem-rack-ssl-doc-1.3.2-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2553</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2553" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) 3.1.x before 3.1.21, 3.2.x before 3.2.16, and 3.3.x before 3.3.6 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to dynamic fields.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095132" comment="otrs-3.1.21-26.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095133" comment="otrs-doc-3.1.21-26.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095134" comment="otrs-itsm-3.1.10-26.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2554</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2554" source="CVE"/>
    <description>
    OTRS 3.1.x before 3.1.21, 3.2.x before 3.2.16, and 3.3.x before 3.3.6 allows remote attackers to conduct clickjacking attacks via an IFRAME element.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095132" comment="otrs-3.1.21-26.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095133" comment="otrs-doc-3.1.21-26.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095134" comment="otrs-itsm-3.1.10-26.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2576</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2576" source="CVE"/>
    <description>
    plugins/rssyl/feed.c in Claws Mail before 3.10.0 disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100878" comment="claws-mail-3.10.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100879" comment="claws-mail-devel-3.10.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100880" comment="claws-mail-lang-3.10.1-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2599</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" source="CVE"/>
    <description>
    The HVMOP_set_mem_access HVM control operations in Xen 4.1.x for 32-bit and 4.1.x through 4.4.x for 64-bit allow local guest administrators to cause a denial of service (CPU consumption) by leveraging access to certain service domains for HVM guests and a large input.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2655</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2655" source="CVE"/>
    <description>
    SQL injection vulnerability in the gen_show_status function in functions.inc.php in Postfix Admin (aka postfixadmin) before 2.3.7 allows remote authenticated users to execute arbitrary SQL commands via a new alias.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096094" comment="postfixadmin-2.3.7-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2667</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2667" source="CVE"/>
    <description>
    Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095335" comment="libpython3_3m1_0-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095336" comment="libpython3_3m1_0-32bit-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095337" comment="python3-base-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095338" comment="python3-base-32bit-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095339" comment="python3-devel-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095340" comment="python3-idle-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095341" comment="python3-testsuite-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095342" comment="python3-tools-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095343" comment="python3-doc-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095344" comment="python3-doc-pdf-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095345" comment="python3-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095346" comment="python3-32bit-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095347" comment="python3-curses-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095348" comment="python3-dbm-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095349" comment="python3-tk-3.3.0-6.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2668</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2668" source="CVE"/>
    <description>
    Apache CouchDB 1.5.0 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via the count parameter to /_uuids.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095135" comment="couchdb-1.2.0-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2672</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672" source="CVE"/>
    <description>
    Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2678</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678" source="CVE"/>
    <description>
    The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097171" comment="kernel-debug-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097172" comment="kernel-debug-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097173" comment="kernel-debug-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097174" comment="kernel-default-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097175" comment="kernel-default-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097176" comment="kernel-default-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097177" comment="kernel-desktop-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097178" comment="kernel-desktop-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097179" comment="kernel-desktop-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097180" comment="kernel-docs-3.7.10-1.36.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097181" comment="kernel-ec2-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097182" comment="kernel-ec2-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097183" comment="kernel-ec2-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097184" comment="kernel-pae-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097185" comment="kernel-pae-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097186" comment="kernel-pae-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097187" comment="kernel-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097188" comment="kernel-source-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097189" comment="kernel-source-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097190" comment="kernel-syms-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097191" comment="kernel-trace-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097192" comment="kernel-trace-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097193" comment="kernel-trace-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097194" comment="kernel-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097195" comment="kernel-vanilla-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097196" comment="kernel-xen-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097197" comment="kernel-xen-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097198" comment="kernel-xen-devel-3.7.10-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2708</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2708" source="CVE"/>
    <description>
    Multiple SQL injection vulnerabilities in graph_xport.php in Cacti 0.8.7g, 0.8.8b, and earlier allow remote attackers to execute arbitrary SQL commands via the (1) graph_start, (2) graph_end, (3) graph_height, (4) graph_width, (5) graph_nolegend, (6) print_source, (7) local_graph_id, or (8) rra_id parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095356" comment="cacti-spine-0.8.8b-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095357" comment="cacti-0.8.8b-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2709</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2709" source="CVE"/>
    <description>
    lib/rrd.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified parameters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095356" comment="cacti-spine-0.8.8b-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095357" comment="cacti-0.8.8b-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2851</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851" source="CVE"/>
    <description>
    Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097171" comment="kernel-debug-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097172" comment="kernel-debug-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097173" comment="kernel-debug-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097174" comment="kernel-default-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097175" comment="kernel-default-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097176" comment="kernel-default-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097177" comment="kernel-desktop-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097178" comment="kernel-desktop-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097179" comment="kernel-desktop-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097180" comment="kernel-docs-3.7.10-1.36.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097181" comment="kernel-ec2-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097182" comment="kernel-ec2-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097183" comment="kernel-ec2-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097184" comment="kernel-pae-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097185" comment="kernel-pae-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097186" comment="kernel-pae-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097187" comment="kernel-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097188" comment="kernel-source-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097189" comment="kernel-source-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097190" comment="kernel-syms-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097191" comment="kernel-trace-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097192" comment="kernel-trace-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097193" comment="kernel-trace-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097194" comment="kernel-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097195" comment="kernel-vanilla-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097196" comment="kernel-xen-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097197" comment="kernel-xen-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097198" comment="kernel-xen-devel-3.7.10-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2891</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891" source="CVE"/>
    <description>
    strongSwan before 5.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a crafted ID_DER_ASN1_DN ID payload.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096013" comment="strongswan-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096014" comment="strongswan-doc-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096015" comment="strongswan-ipsec-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096016" comment="strongswan-libs0-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096017" comment="strongswan-mysql-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096018" comment="strongswan-nm-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096019" comment="strongswan-sqlite-5.0.1-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2892</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2892" source="CVE"/>
    <description>
    Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095366" comment="libmms-0.6.2-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095367" comment="libmms-devel-0.6.2-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095368" comment="libmms0-0.6.2-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095369" comment="libmms0-32bit-0.6.2-10.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2913</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2913" source="CVE"/>
    <description>
    ** DISPUTED ** Incomplete blacklist vulnerability in nrpe.c in Nagios Remote Plugin Executor (NRPE) 2.15 and earlier allows remote attackers to execute arbitrary commands via a newline character in the -a option to libexec/check_nrpe.  NOTE: this issue is disputed by multiple parties. It has been reported that the vendor allows newlines as "expected behavior." Also, this issue can only occur when the administrator enables the "dont_blame_nrpe" option in nrpe.conf despite the "HIGH security risk" warning within the comments.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095370" comment="nagios-plugins-nrpe-2.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095371" comment="nrpe-2.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095372" comment="nrpe-doc-2.14-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2957</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2957" source="CVE"/>
    <description>
    The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099265" comment="exim-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099266" comment="eximon-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099267" comment="eximstats-html-4.83-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2972</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-2972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2972" source="CVE"/>
    <description>
    expand.c in Exim before 4.83 expands mathematical comparisons twice, which allows local users to gain privileges and execute arbitrary commands via a crafted lookup value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099265" comment="exim-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099266" comment="eximon-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099267" comment="eximstats-html-4.83-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3004</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3004" source="CVE"/>
    <description>
    The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096790" comment="castor-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096791" comment="castor-demo-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096792" comment="castor-doc-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096793" comment="castor-javadoc-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096794" comment="castor-test-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096795" comment="castor-xml-0.9.5-317.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3121</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3121" source="CVE"/>
    <description>
    rxvt-unicode before 9.20 does not properly handle OSC escape sequences, which allows user-assisted remote attackers to manipulate arbitrary X window properties and execute arbitrary commands.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096691" comment="rxvt-unicode-9.15-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3122</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122" source="CVE"/>
    <description>
    The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097171" comment="kernel-debug-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097172" comment="kernel-debug-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097173" comment="kernel-debug-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097174" comment="kernel-default-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097175" comment="kernel-default-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097176" comment="kernel-default-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097177" comment="kernel-desktop-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097178" comment="kernel-desktop-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097179" comment="kernel-desktop-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097180" comment="kernel-docs-3.7.10-1.36.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097181" comment="kernel-ec2-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097182" comment="kernel-ec2-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097183" comment="kernel-ec2-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097184" comment="kernel-pae-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097185" comment="kernel-pae-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097186" comment="kernel-pae-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097187" comment="kernel-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097188" comment="kernel-source-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097189" comment="kernel-source-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097190" comment="kernel-syms-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097191" comment="kernel-trace-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097192" comment="kernel-trace-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097193" comment="kernel-trace-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097194" comment="kernel-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097195" comment="kernel-vanilla-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097196" comment="kernel-xen-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097197" comment="kernel-xen-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097198" comment="kernel-xen-devel-3.7.10-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3144</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" source="CVE"/>
    <description>
    The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3145</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" source="CVE"/>
    <description>
    The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3146</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146" source="CVE"/>
    <description>
    Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096148" comment="python-lxml-2.3.4-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096149" comment="python-lxml-doc-2.3.4-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096150" comment="python3-lxml-2.3.4-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096151" comment="python3-lxml-doc-2.3.4-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3152</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3152" source="CVE"/>
    <description>
    Integer underflow in the LCodeGen::PrepareKeyedOperand function in arm/lithium-codegen-arm.cc in Google V8 before 3.25.28.16, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a negative key value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3153</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" source="CVE"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097171" comment="kernel-debug-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097172" comment="kernel-debug-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097173" comment="kernel-debug-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097174" comment="kernel-default-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097175" comment="kernel-default-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097176" comment="kernel-default-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097177" comment="kernel-desktop-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097178" comment="kernel-desktop-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097179" comment="kernel-desktop-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097180" comment="kernel-docs-3.7.10-1.36.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097181" comment="kernel-ec2-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097182" comment="kernel-ec2-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097183" comment="kernel-ec2-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097184" comment="kernel-pae-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097185" comment="kernel-pae-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097186" comment="kernel-pae-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097187" comment="kernel-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097188" comment="kernel-source-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097189" comment="kernel-source-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097190" comment="kernel-syms-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097191" comment="kernel-trace-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097192" comment="kernel-trace-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097193" comment="kernel-trace-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097194" comment="kernel-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097195" comment="kernel-vanilla-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097196" comment="kernel-xen-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097197" comment="kernel-xen-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097198" comment="kernel-xen-devel-3.7.10-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3154</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3154" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ChildThread::Shutdown function in content/child/child_thread.cc in the filesystem API in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to a Blink shutdown.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099268" comment="chromedriver-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099269" comment="chromium-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099270" comment="chromium-desktop-gnome-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099271" comment="chromium-desktop-kde-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099272" comment="chromium-ffmpegsumo-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099273" comment="chromium-suid-helper-36.0.1985.125-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3155</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3155" source="CVE"/>
    <description>
    net/spdy/spdy_write_queue.cc in the SPDY implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging incorrect queue maintenance.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099268" comment="chromedriver-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099269" comment="chromium-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099270" comment="chromium-desktop-gnome-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099271" comment="chromium-desktop-kde-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099272" comment="chromium-ffmpegsumo-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099273" comment="chromium-suid-helper-36.0.1985.125-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3156</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3156" source="CVE"/>
    <description>
    Buffer overflow in the clipboard implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unexpected bitmap data, related to content/renderer/renderer_clipboard_client.cc and content/renderer/webclipboard_impl.cc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099268" comment="chromedriver-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099269" comment="chromium-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099270" comment="chromium-desktop-gnome-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099271" comment="chromium-desktop-kde-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099272" comment="chromium-ffmpegsumo-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099273" comment="chromium-suid-helper-36.0.1985.125-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3157</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3157" source="CVE"/>
    <description>
    Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099268" comment="chromedriver-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099269" comment="chromium-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099270" comment="chromium-desktop-gnome-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099271" comment="chromium-desktop-kde-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099272" comment="chromium-ffmpegsumo-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099273" comment="chromium-suid-helper-36.0.1985.125-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3158</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158" source="CVE"/>
    <description>
    Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100468" comment="ppp-2.4.5-15.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100469" comment="ppp-devel-2.4.5-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3160</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3160" source="CVE"/>
    <description>
    The ResourceFetcher::canRequest function in core/fetch/ResourceFetcher.cpp in Blink, as used in Google Chrome before 36.0.1985.125, does not properly restrict subresource requests associated with SVG files, which allows remote attackers to bypass the Same Origin Policy via a crafted file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099268" comment="chromedriver-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099269" comment="chromium-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099270" comment="chromium-desktop-gnome-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099271" comment="chromium-desktop-kde-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099272" comment="chromium-ffmpegsumo-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099273" comment="chromium-suid-helper-36.0.1985.125-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3162</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3162" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 36.0.1985.125 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099268" comment="chromedriver-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099269" comment="chromium-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099270" comment="chromium-desktop-gnome-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099271" comment="chromium-desktop-kde-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099272" comment="chromium-ffmpegsumo-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099273" comment="chromium-suid-helper-36.0.1985.125-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3168</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3168" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper caching associated with animation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3169</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3169" source="CVE"/>
    <description>
    Use-after-free vulnerability in core/dom/ContainerNode.cpp in the DOM implementation in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging script execution that occurs before notification of node removal.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3170</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3170" source="CVE"/>
    <description>
    extensions/common/url_pattern.cc in Google Chrome before 37.0.2062.94 does not prevent use of a '\0' character in a host name, which allows remote attackers to spoof the extension permission dialog by relying on truncation after this character.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3171</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3171" source="CVE"/>
    <description>
    Use-after-free vulnerability in the V8 bindings in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper use of HashMap add operations instead of HashMap set operations, related to bindings/core/v8/DOMWrapperMap.h and bindings/core/v8/SerializedScriptValue.cpp.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3172</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3172" source="CVE"/>
    <description>
    The Debugger extension API in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 37.0.2062.94 does not validate a tab's URL before an attach operation, which allows remote attackers to bypass intended access limitations via an extension that uses a restricted URL, as demonstrated by a chrome:// URL.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3173</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3173" source="CVE"/>
    <description>
    The WebGL implementation in Google Chrome before 37.0.2062.94 does not ensure that clear calls interact properly with the state of a draw buffer, which allows remote attackers to cause a denial of service (read of uninitialized memory) via a crafted CANVAS element, related to gpu/command_buffer/service/framebuffer_manager.cc and gpu/command_buffer/service/gles2_cmd_decoder.cc.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3174</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3174" source="CVE"/>
    <description>
    modules/webaudio/BiquadDSPKernel.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 37.0.2062.94, does not properly consider concurrent threads during attempts to update biquad filter coefficients, which allows remote attackers to cause a denial of service (read of uninitialized memory) via crafted API calls.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3176</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3176" source="CVE"/>
    <description>
    Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3177.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3177</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3177" source="CVE"/>
    <description>
    Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3176.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3181</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3182</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3182" source="CVE"/>
    <description>
    Array index error in the logi_dj_raw_event function in drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows physically proximate attackers to execute arbitrary code or cause a denial of service (invalid kfree) via a crafted device that provides a malformed REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3184</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184" source="CVE"/>
    <description>
    The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3185</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185" source="CVE"/>
    <description>
    Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3186</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186" source="CVE"/>
    <description>
    Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3215</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3215" source="CVE"/>
    <description>
    seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096141" comment="libcap-ng-python-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096142" comment="python-capng-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096143" comment="libcap-ng-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096144" comment="libcap-ng-devel-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096145" comment="libcap-ng-utils-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096146" comment="libcap-ng0-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096147" comment="libcap-ng0-32bit-0.6.6-11.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3230</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3230" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096196" comment="perl-LWP-Protocol-https-6.03-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3429</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3429" source="CVE"/>
    <description>
    IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099863" comment="IPython-0.13.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099864" comment="IPython-doc-0.13.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099865" comment="python3-IPython-0.13.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3465</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465" source="CVE"/>
    <description>
    The gnutls_x509_dn_oid_name function in lib/x509/common.c in GnuTLS 3.0 before 3.1.20 and 3.2.x before 3.2.10 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted X.509 certificate, related to a missing LDAP description for an OID when printing the DN.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096337" comment="gnutls-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096338" comment="libgnutls-devel-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096339" comment="libgnutls-devel-32bit-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096340" comment="libgnutls-openssl-devel-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096341" comment="libgnutls-openssl27-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096342" comment="libgnutls28-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096343" comment="libgnutls28-32bit-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096344" comment="libgnutlsxx-devel-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096345" comment="libgnutlsxx28-3.0.28-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3466</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" source="CVE"/>
    <description>
    Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096337" comment="gnutls-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096338" comment="libgnutls-devel-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096339" comment="libgnutls-devel-32bit-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096340" comment="libgnutls-openssl-devel-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096341" comment="libgnutls-openssl27-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096342" comment="libgnutls28-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096343" comment="libgnutls28-32bit-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096344" comment="libgnutlsxx-devel-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096345" comment="libgnutlsxx28-3.0.28-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3470</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" source="CVE"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096346" comment="libopenssl-devel-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096347" comment="libopenssl-devel-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096348" comment="libopenssl1_0_0-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096349" comment="libopenssl1_0_0-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096350" comment="openssl-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096351" comment="openssl-doc-1.0.1h-1.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3477</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477" source="CVE"/>
    <description>
    The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096782" comment="dbus-1-x11-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096783" comment="dbus-1-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096784" comment="dbus-1-32bit-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096785" comment="dbus-1-devel-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096786" comment="dbus-1-devel-32bit-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096787" comment="dbus-1-devel-doc-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096788" comment="libdbus-1-3-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096789" comment="libdbus-1-3-32bit-1.6.8-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3478</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478" source="CVE"/>
    <description>
    Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098175" comment="apache2-mod_php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098176" comment="php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098177" comment="php5-bcmath-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098178" comment="php5-bz2-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098179" comment="php5-calendar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098180" comment="php5-ctype-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098181" comment="php5-curl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098182" comment="php5-dba-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098183" comment="php5-devel-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098184" comment="php5-dom-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098185" comment="php5-enchant-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098186" comment="php5-exif-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098187" comment="php5-fastcgi-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098188" comment="php5-fileinfo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098189" comment="php5-fpm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098190" comment="php5-ftp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098191" comment="php5-gd-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098192" comment="php5-gettext-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098193" comment="php5-gmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098194" comment="php5-iconv-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098195" comment="php5-imap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098196" comment="php5-intl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098197" comment="php5-json-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098198" comment="php5-ldap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098199" comment="php5-mbstring-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098200" comment="php5-mcrypt-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098201" comment="php5-mssql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098202" comment="php5-mysql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098203" comment="php5-odbc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098204" comment="php5-openssl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098205" comment="php5-pcntl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098206" comment="php5-pdo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098207" comment="php5-pear-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098208" comment="php5-pgsql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098209" comment="php5-phar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098210" comment="php5-posix-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098211" comment="php5-pspell-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098212" comment="php5-readline-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098213" comment="php5-shmop-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098214" comment="php5-snmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098215" comment="php5-soap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098216" comment="php5-sockets-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098217" comment="php5-sqlite-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098218" comment="php5-suhosin-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098219" comment="php5-sysvmsg-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098220" comment="php5-sysvsem-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098221" comment="php5-sysvshm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098222" comment="php5-tidy-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098223" comment="php5-tokenizer-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098224" comment="php5-wddx-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098225" comment="php5-xmlreader-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098226" comment="php5-xmlrpc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098227" comment="php5-xmlwriter-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098228" comment="php5-xsl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098229" comment="php5-zip-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098230" comment="php5-zlib-5.3.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3479</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479" source="CVE"/>
    <description>
    The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098175" comment="apache2-mod_php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098176" comment="php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098177" comment="php5-bcmath-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098178" comment="php5-bz2-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098179" comment="php5-calendar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098180" comment="php5-ctype-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098181" comment="php5-curl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098182" comment="php5-dba-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098183" comment="php5-devel-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098184" comment="php5-dom-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098185" comment="php5-enchant-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098186" comment="php5-exif-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098187" comment="php5-fastcgi-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098188" comment="php5-fileinfo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098189" comment="php5-fpm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098190" comment="php5-ftp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098191" comment="php5-gd-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098192" comment="php5-gettext-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098193" comment="php5-gmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098194" comment="php5-iconv-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098195" comment="php5-imap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098196" comment="php5-intl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098197" comment="php5-json-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098198" comment="php5-ldap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098199" comment="php5-mbstring-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098200" comment="php5-mcrypt-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098201" comment="php5-mssql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098202" comment="php5-mysql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098203" comment="php5-odbc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098204" comment="php5-openssl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098205" comment="php5-pcntl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098206" comment="php5-pdo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098207" comment="php5-pear-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098208" comment="php5-pgsql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098209" comment="php5-phar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098210" comment="php5-posix-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098211" comment="php5-pspell-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098212" comment="php5-readline-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098213" comment="php5-shmop-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098214" comment="php5-snmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098215" comment="php5-soap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098216" comment="php5-sockets-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098217" comment="php5-sqlite-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098218" comment="php5-suhosin-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098219" comment="php5-sysvmsg-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098220" comment="php5-sysvsem-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098221" comment="php5-sysvshm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098222" comment="php5-tidy-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098223" comment="php5-tokenizer-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098224" comment="php5-wddx-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098225" comment="php5-xmlreader-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098226" comment="php5-xmlrpc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098227" comment="php5-xmlwriter-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098228" comment="php5-xsl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098229" comment="php5-zip-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098230" comment="php5-zlib-5.3.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3480</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480" source="CVE"/>
    <description>
    The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098175" comment="apache2-mod_php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098176" comment="php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098177" comment="php5-bcmath-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098178" comment="php5-bz2-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098179" comment="php5-calendar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098180" comment="php5-ctype-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098181" comment="php5-curl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098182" comment="php5-dba-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098183" comment="php5-devel-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098184" comment="php5-dom-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098185" comment="php5-enchant-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098186" comment="php5-exif-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098187" comment="php5-fastcgi-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098188" comment="php5-fileinfo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098189" comment="php5-fpm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098190" comment="php5-ftp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098191" comment="php5-gd-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098192" comment="php5-gettext-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098193" comment="php5-gmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098194" comment="php5-iconv-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098195" comment="php5-imap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098196" comment="php5-intl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098197" comment="php5-json-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098198" comment="php5-ldap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098199" comment="php5-mbstring-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098200" comment="php5-mcrypt-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098201" comment="php5-mssql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098202" comment="php5-mysql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098203" comment="php5-odbc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098204" comment="php5-openssl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098205" comment="php5-pcntl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098206" comment="php5-pdo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098207" comment="php5-pear-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098208" comment="php5-pgsql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098209" comment="php5-phar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098210" comment="php5-posix-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098211" comment="php5-pspell-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098212" comment="php5-readline-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098213" comment="php5-shmop-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098214" comment="php5-snmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098215" comment="php5-soap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098216" comment="php5-sockets-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098217" comment="php5-sqlite-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098218" comment="php5-suhosin-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098219" comment="php5-sysvmsg-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098220" comment="php5-sysvsem-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098221" comment="php5-sysvshm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098222" comment="php5-tidy-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098223" comment="php5-tokenizer-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098224" comment="php5-wddx-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098225" comment="php5-xmlreader-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098226" comment="php5-xmlrpc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098227" comment="php5-xmlwriter-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098228" comment="php5-xsl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098229" comment="php5-zip-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098230" comment="php5-zlib-5.3.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3487</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487" source="CVE"/>
    <description>
    The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098175" comment="apache2-mod_php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098176" comment="php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098177" comment="php5-bcmath-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098178" comment="php5-bz2-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098179" comment="php5-calendar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098180" comment="php5-ctype-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098181" comment="php5-curl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098182" comment="php5-dba-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098183" comment="php5-devel-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098184" comment="php5-dom-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098185" comment="php5-enchant-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098186" comment="php5-exif-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098187" comment="php5-fastcgi-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098188" comment="php5-fileinfo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098189" comment="php5-fpm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098190" comment="php5-ftp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098191" comment="php5-gd-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098192" comment="php5-gettext-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098193" comment="php5-gmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098194" comment="php5-iconv-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098195" comment="php5-imap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098196" comment="php5-intl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098197" comment="php5-json-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098198" comment="php5-ldap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098199" comment="php5-mbstring-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098200" comment="php5-mcrypt-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098201" comment="php5-mssql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098202" comment="php5-mysql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098203" comment="php5-odbc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098204" comment="php5-openssl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098205" comment="php5-pcntl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098206" comment="php5-pdo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098207" comment="php5-pear-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098208" comment="php5-pgsql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098209" comment="php5-phar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098210" comment="php5-posix-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098211" comment="php5-pspell-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098212" comment="php5-readline-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098213" comment="php5-shmop-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098214" comment="php5-snmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098215" comment="php5-soap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098216" comment="php5-sockets-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098217" comment="php5-sqlite-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098218" comment="php5-suhosin-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098219" comment="php5-sysvmsg-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098220" comment="php5-sysvsem-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098221" comment="php5-sysvshm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098222" comment="php5-tidy-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098223" comment="php5-tokenizer-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098224" comment="php5-wddx-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098225" comment="php5-xmlreader-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098226" comment="php5-xmlrpc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098227" comment="php5-xmlwriter-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098228" comment="php5-xsl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098229" comment="php5-zip-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098230" comment="php5-zlib-5.3.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3493</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" source="CVE"/>
    <description>
    The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097210" comment="samba-doc-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097211" comment="libnetapi-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097212" comment="libnetapi0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097213" comment="libsmbclient-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097214" comment="libsmbclient0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097215" comment="libsmbclient0-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097216" comment="libsmbsharemodes-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097217" comment="libsmbsharemodes0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097218" comment="libwbclient-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097219" comment="libwbclient0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097220" comment="libwbclient0-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097221" comment="samba-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097222" comment="samba-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097223" comment="samba-client-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097224" comment="samba-client-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097225" comment="samba-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097226" comment="samba-krb-printing-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097227" comment="samba-winbind-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097228" comment="samba-winbind-32bit-3.6.12-59.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3504</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3504" source="CVE"/>
    <description>
    The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099851" comment="libserf-1-0-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099852" comment="libserf-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099853" comment="libserf-devel-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099854" comment="libsvn_auth_gnome_keyring-1-0-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099855" comment="libsvn_auth_kwallet-1-0-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099856" comment="subversion-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099857" comment="subversion-bash-completion-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099858" comment="subversion-devel-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099859" comment="subversion-perl-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099860" comment="subversion-python-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099861" comment="subversion-server-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099862" comment="subversion-tools-1.7.18-2.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3505</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505" source="CVE"/>
    <description>
    Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3506</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506" source="CVE"/>
    <description>
    d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3507</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507" source="CVE"/>
    <description>
    Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3508</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508" source="CVE"/>
    <description>
    The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3509</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509" source="CVE"/>
    <description>
    Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3510</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510" source="CVE"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3511</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511" source="CVE"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3512</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512" source="CVE"/>
    <description>
    Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3513</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513" source="CVE"/>
    <description>
    Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101049" comment="libopenssl-devel-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101050" comment="libopenssl-devel-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101051" comment="libopenssl1_0_0-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101052" comment="libopenssl1_0_0-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101053" comment="openssl-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101054" comment="openssl-doc-1.0.1j-1.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3515</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515" source="CVE"/>
    <description>
    The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098175" comment="apache2-mod_php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098176" comment="php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098177" comment="php5-bcmath-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098178" comment="php5-bz2-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098179" comment="php5-calendar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098180" comment="php5-ctype-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098181" comment="php5-curl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098182" comment="php5-dba-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098183" comment="php5-devel-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098184" comment="php5-dom-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098185" comment="php5-enchant-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098186" comment="php5-exif-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098187" comment="php5-fastcgi-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098188" comment="php5-fileinfo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098189" comment="php5-fpm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098190" comment="php5-ftp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098191" comment="php5-gd-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098192" comment="php5-gettext-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098193" comment="php5-gmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098194" comment="php5-iconv-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098195" comment="php5-imap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098196" comment="php5-intl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098197" comment="php5-json-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098198" comment="php5-ldap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098199" comment="php5-mbstring-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098200" comment="php5-mcrypt-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098201" comment="php5-mssql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098202" comment="php5-mysql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098203" comment="php5-odbc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098204" comment="php5-openssl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098205" comment="php5-pcntl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098206" comment="php5-pdo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098207" comment="php5-pear-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098208" comment="php5-pgsql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098209" comment="php5-phar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098210" comment="php5-posix-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098211" comment="php5-pspell-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098212" comment="php5-readline-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098213" comment="php5-shmop-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098214" comment="php5-snmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098215" comment="php5-soap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098216" comment="php5-sockets-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098217" comment="php5-sqlite-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098218" comment="php5-suhosin-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098219" comment="php5-sysvmsg-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098220" comment="php5-sysvsem-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098221" comment="php5-sysvshm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098222" comment="php5-tidy-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098223" comment="php5-tokenizer-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098224" comment="php5-wddx-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098225" comment="php5-xmlreader-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098226" comment="php5-xmlrpc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098227" comment="php5-xmlwriter-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098228" comment="php5-xsl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098229" comment="php5-zip-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098230" comment="php5-zlib-5.3.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3522</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3522" source="CVE"/>
    <description>
    The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099851" comment="libserf-1-0-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099852" comment="libserf-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099853" comment="libserf-devel-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099854" comment="libsvn_auth_gnome_keyring-1-0-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099855" comment="libsvn_auth_kwallet-1-0-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099856" comment="subversion-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099857" comment="subversion-bash-completion-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099858" comment="subversion-devel-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099859" comment="subversion-perl-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099860" comment="subversion-python-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099861" comment="subversion-server-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099862" comment="subversion-tools-1.7.18-2.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3528</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3528" source="CVE"/>
    <description>
    Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099851" comment="libserf-1-0-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099852" comment="libserf-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099853" comment="libserf-devel-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099854" comment="libsvn_auth_gnome_keyring-1-0-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099855" comment="libsvn_auth_kwallet-1-0-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099856" comment="subversion-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099857" comment="subversion-bash-completion-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099858" comment="subversion-devel-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099859" comment="subversion-perl-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099860" comment="subversion-python-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099861" comment="subversion-server-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099862" comment="subversion-tools-1.7.18-2.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3564</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099613" comment="gpgme-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099614" comment="libgpgme-devel-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099615" comment="libgpgme11-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099616" comment="libgpgme11-32bit-1.3.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3565</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565" source="CVE"/>
    <description>
    snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100016" comment="libsnmp30-32bit-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100017" comment="libsnmp30-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100018" comment="net-snmp-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100019" comment="net-snmp-devel-32bit-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100020" comment="net-snmp-devel-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100021" comment="perl-SNMP-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100022" comment="snmp-mibs-5.7.2-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3566</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" source="CVE"/>
    <description>
    The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101049" comment="libopenssl-devel-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101050" comment="libopenssl-devel-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101051" comment="libopenssl1_0_0-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101052" comment="libopenssl1_0_0-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101053" comment="openssl-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101054" comment="openssl-doc-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101334" comment="libserf-1-0-1.1.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101335" comment="libserf-1.1.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101336" comment="libserf-devel-1.1.1-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
    <description>
    Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101049" comment="libopenssl-devel-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101050" comment="libopenssl-devel-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101051" comment="libopenssl1_0_0-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101052" comment="libopenssl1_0_0-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101053" comment="openssl-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101054" comment="openssl-doc-1.0.1j-1.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3568</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101049" comment="libopenssl-devel-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101050" comment="libopenssl-devel-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101051" comment="libopenssl1_0_0-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101052" comment="libopenssl1_0_0-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101053" comment="openssl-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101054" comment="openssl-doc-1.0.1j-1.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3575</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3575" source="CVE"/>
    <description>
    The OLE preview generation in Apache OpenOffice before 4.1.1 and OpenOffice.org (OOo) might allow remote attackers to embed arbitrary data into documents via crafted OLE objects.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100165" comment="libreoffice-branding-upstream-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100166" comment="libreoffice-help-en-US-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100167" comment="libreoffice-help-ast-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100168" comment="libreoffice-help-bg-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100169" comment="libreoffice-help-ca-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100170" comment="libreoffice-help-cs-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100171" comment="libreoffice-help-da-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100172" comment="libreoffice-help-de-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100173" comment="libreoffice-help-en-GB-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100174" comment="libreoffice-help-group1-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100175" comment="libreoffice-help-el-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100176" comment="libreoffice-help-en-ZA-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100177" comment="libreoffice-help-es-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100178" comment="libreoffice-help-et-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100179" comment="libreoffice-help-eu-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100180" comment="libreoffice-help-fi-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100181" comment="libreoffice-help-fr-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100182" comment="libreoffice-help-group2-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100183" comment="libreoffice-help-gl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100184" comment="libreoffice-help-group3-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100185" comment="libreoffice-help-gu-IN-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100186" comment="libreoffice-help-hi-IN-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100187" comment="libreoffice-help-hu-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100188" comment="libreoffice-help-it-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100189" comment="libreoffice-help-ja-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100190" comment="libreoffice-help-km-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100191" comment="libreoffice-help-group4-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100192" comment="libreoffice-help-ko-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100193" comment="libreoffice-help-mk-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100194" comment="libreoffice-help-nb-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100195" comment="libreoffice-help-nl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100196" comment="libreoffice-help-pl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100197" comment="libreoffice-help-pt-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100198" comment="libreoffice-help-pt-BR-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100199" comment="libreoffice-help-group5-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100200" comment="libreoffice-help-ru-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100201" comment="libreoffice-help-sk-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100202" comment="libreoffice-help-sl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100203" comment="libreoffice-help-sv-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100204" comment="libreoffice-help-tr-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100205" comment="libreoffice-help-vi-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100206" comment="libreoffice-help-zh-CN-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100207" comment="libreoffice-help-zh-TW-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100208" comment="libreoffice-icon-theme-crystal-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100209" comment="libreoffice-icon-theme-galaxy-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100210" comment="libreoffice-icon-theme-hicontrast-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100211" comment="libreoffice-icon-theme-oxygen-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100212" comment="libreoffice-icon-theme-tango-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100213" comment="libreoffice-icon-themes-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100214" comment="libreoffice-l10n-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100215" comment="libreoffice-l10n-af-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100216" comment="libreoffice-l10n-am-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100217" comment="libreoffice-l10n-ar-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100218" comment="libreoffice-l10n-as-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100219" comment="libreoffice-l10n-ast-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100220" comment="libreoffice-l10n-be-BY-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100221" comment="libreoffice-l10n-bg-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100222" comment="libreoffice-l10n-br-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100223" comment="libreoffice-l10n-ca-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100224" comment="libreoffice-l10n-cs-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100225" comment="libreoffice-l10n-cy-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100226" comment="libreoffice-l10n-da-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100227" comment="libreoffice-l10n-de-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100228" comment="libreoffice-l10n-el-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100229" comment="libreoffice-l10n-en-GB-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100230" comment="libreoffice-l10n-en-ZA-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100231" comment="libreoffice-l10n-eo-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100232" comment="libreoffice-l10n-es-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100233" comment="libreoffice-l10n-et-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100234" comment="libreoffice-l10n-eu-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100235" comment="libreoffice-l10n-fi-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100236" comment="libreoffice-l10n-fr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100237" comment="libreoffice-l10n-ga-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100238" comment="libreoffice-l10n-gd-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100239" comment="libreoffice-l10n-gl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100240" comment="libreoffice-l10n-gu-IN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100241" comment="libreoffice-l10n-he-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100242" comment="libreoffice-l10n-hi-IN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100243" comment="libreoffice-l10n-hr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100244" comment="libreoffice-l10n-hu-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100245" comment="libreoffice-l10n-id-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100246" comment="libreoffice-l10n-is-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100247" comment="libreoffice-l10n-it-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100248" comment="libreoffice-l10n-ja-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100249" comment="libreoffice-l10n-ka-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100250" comment="libreoffice-l10n-km-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100251" comment="libreoffice-l10n-kn-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100252" comment="libreoffice-l10n-ko-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100253" comment="libreoffice-l10n-lt-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100254" comment="libreoffice-l10n-mk-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100255" comment="libreoffice-l10n-ml-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100256" comment="libreoffice-l10n-mr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100257" comment="libreoffice-l10n-nb-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100258" comment="libreoffice-l10n-nl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100259" comment="libreoffice-l10n-nn-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100260" comment="libreoffice-l10n-nr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100261" comment="libreoffice-l10n-om-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100262" comment="libreoffice-l10n-or-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100263" comment="libreoffice-l10n-pa-IN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100264" comment="libreoffice-l10n-pl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100265" comment="libreoffice-l10n-pt-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100266" comment="libreoffice-l10n-pt-BR-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100267" comment="libreoffice-l10n-ro-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100268" comment="libreoffice-l10n-ru-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100269" comment="libreoffice-l10n-rw-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100270" comment="libreoffice-l10n-sh-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100271" comment="libreoffice-l10n-sk-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100272" comment="libreoffice-l10n-sl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100273" comment="libreoffice-l10n-sr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100274" comment="libreoffice-l10n-ss-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100275" comment="libreoffice-l10n-st-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100276" comment="libreoffice-l10n-sv-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100277" comment="libreoffice-l10n-ta-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100278" comment="libreoffice-l10n-te-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100279" comment="libreoffice-l10n-tg-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100280" comment="libreoffice-l10n-th-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100281" comment="libreoffice-l10n-tr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100282" comment="libreoffice-l10n-ts-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100283" comment="libreoffice-l10n-ug-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100284" comment="libreoffice-l10n-uk-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100285" comment="libreoffice-l10n-ve-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100286" comment="libreoffice-l10n-vi-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100287" comment="libreoffice-l10n-xh-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100288" comment="libreoffice-l10n-zh-CN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100289" comment="libreoffice-l10n-zh-TW-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100290" comment="libreoffice-l10n-zu-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100291" comment="libreoffice-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100292" comment="libreoffice-base-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100293" comment="libreoffice-base-drivers-mysql-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100294" comment="libreoffice-base-drivers-postgresql-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100295" comment="libreoffice-base-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100296" comment="libreoffice-calc-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100297" comment="libreoffice-calc-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100298" comment="libreoffice-draw-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100299" comment="libreoffice-draw-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100300" comment="libreoffice-filters-optional-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100301" comment="libreoffice-gnome-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100302" comment="libreoffice-icon-themes-prebuilt-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100303" comment="libreoffice-impress-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100304" comment="libreoffice-impress-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100305" comment="libreoffice-kde-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100306" comment="libreoffice-kde4-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100307" comment="libreoffice-l10n-prebuilt-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100308" comment="libreoffice-mailmerge-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100309" comment="libreoffice-math-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100310" comment="libreoffice-officebean-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100311" comment="libreoffice-pyuno-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100312" comment="libreoffice-sdk-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100313" comment="libreoffice-sdk-doc-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100314" comment="libreoffice-writer-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100315" comment="libreoffice-writer-extensions-3.6.3.2.4-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3580</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3580" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103245" comment="libsvn_auth_gnome_keyring-1-0-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103246" comment="libsvn_auth_kwallet-1-0-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103247" comment="subversion-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103248" comment="subversion-bash-completion-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103249" comment="subversion-devel-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103250" comment="subversion-perl-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103251" comment="subversion-python-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103252" comment="subversion-server-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103253" comment="subversion-tools-1.7.19-2.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3597</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597" source="CVE"/>
    <description>
    Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function.  NOTE: this issue exists because of an incomplete fix for CVE-2014-4049.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100470" comment="apache2-mod_php5-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100471" comment="php5-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100472" comment="php5-bcmath-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100473" comment="php5-bz2-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100474" comment="php5-calendar-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100475" comment="php5-ctype-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100476" comment="php5-curl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100477" comment="php5-dba-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100478" comment="php5-devel-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100479" comment="php5-dom-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100480" comment="php5-enchant-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100481" comment="php5-exif-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100482" comment="php5-fastcgi-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100483" comment="php5-fileinfo-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100484" comment="php5-fpm-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100485" comment="php5-ftp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100486" comment="php5-gd-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100487" comment="php5-gettext-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100488" comment="php5-gmp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100489" comment="php5-iconv-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100490" comment="php5-imap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100491" comment="php5-intl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100492" comment="php5-json-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100493" comment="php5-ldap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100494" comment="php5-mbstring-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100495" comment="php5-mcrypt-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100496" comment="php5-mssql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100497" comment="php5-mysql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100498" comment="php5-odbc-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100499" comment="php5-openssl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100500" comment="php5-pcntl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100501" comment="php5-pdo-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100502" comment="php5-pear-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100503" comment="php5-pgsql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100504" comment="php5-phar-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100505" comment="php5-posix-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100506" comment="php5-pspell-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100507" comment="php5-readline-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100508" comment="php5-shmop-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100509" comment="php5-snmp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100510" comment="php5-soap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100511" comment="php5-sockets-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100512" comment="php5-sqlite-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100513" comment="php5-suhosin-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100514" comment="php5-sysvmsg-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100515" comment="php5-sysvsem-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100516" comment="php5-sysvshm-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100517" comment="php5-tidy-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100518" comment="php5-tokenizer-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100519" comment="php5-wddx-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100520" comment="php5-xmlreader-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100521" comment="php5-xmlrpc-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100522" comment="php5-xmlwriter-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100523" comment="php5-xsl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100524" comment="php5-zip-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100525" comment="php5-zlib-5.3.17-3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3609</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609" source="CVE"/>
    <description>
    HttpHdrRange.cc in Squid 3.x before 3.3.12 and 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via a request with crafted "Range headers with unidentifiable byte-range values."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100680" comment="squid-3.2.11-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3613</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613" source="CVE"/>
    <description>
    cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100587" comment="curl-7.28.1-4.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100588" comment="libcurl-devel-7.28.1-4.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100589" comment="libcurl4-32bit-7.28.1-4.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100590" comment="libcurl4-7.28.1-4.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3618</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618" source="CVE"/>
    <description>
    Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100050" comment="procmail-3.22-260.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3620</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620" source="CVE"/>
    <description>
    cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100587" comment="curl-7.28.1-4.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100588" comment="libcurl-devel-7.28.1-4.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100589" comment="libcurl4-32bit-7.28.1-4.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100590" comment="libcurl4-7.28.1-4.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3633</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" source="CVE"/>
    <description>
    The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100855" comment="libvirt-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100856" comment="libvirt-client-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100857" comment="libvirt-client-32bit-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100858" comment="libvirt-devel-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100859" comment="libvirt-devel-32bit-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100860" comment="libvirt-doc-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100861" comment="libvirt-lock-sanlock-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100862" comment="libvirt-python-1.0.2-1.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3634</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" source="CVE"/>
    <description>
    rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100928" comment="rsyslog-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100929" comment="rsyslog-diag-tools-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100930" comment="rsyslog-doc-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100931" comment="rsyslog-module-dbi-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100932" comment="rsyslog-module-elasticsearch-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100933" comment="rsyslog-module-gssapi-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100934" comment="rsyslog-module-gtls-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100935" comment="rsyslog-module-mmnormalize-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100936" comment="rsyslog-module-mysql-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100937" comment="rsyslog-module-pgsql-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100938" comment="rsyslog-module-relp-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100939" comment="rsyslog-module-snmp-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100940" comment="rsyslog-module-udpspoof-7.2.7-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3635</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635" source="CVE"/>
    <description>
    Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100740" comment="dbus-1-x11-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100741" comment="dbus-1-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100742" comment="dbus-1-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100743" comment="dbus-1-devel-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100744" comment="dbus-1-devel-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100745" comment="dbus-1-devel-doc-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100746" comment="libdbus-1-3-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100747" comment="libdbus-1-3-32bit-1.6.24-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3636</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636" source="CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100740" comment="dbus-1-x11-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100741" comment="dbus-1-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100742" comment="dbus-1-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100743" comment="dbus-1-devel-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100744" comment="dbus-1-devel-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100745" comment="dbus-1-devel-doc-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100746" comment="libdbus-1-3-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100747" comment="libdbus-1-3-32bit-1.6.24-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3637</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637" source="CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100740" comment="dbus-1-x11-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100741" comment="dbus-1-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100742" comment="dbus-1-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100743" comment="dbus-1-devel-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100744" comment="dbus-1-devel-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100745" comment="dbus-1-devel-doc-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100746" comment="libdbus-1-3-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100747" comment="libdbus-1-3-32bit-1.6.24-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3638</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638" source="CVE"/>
    <description>
    The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100740" comment="dbus-1-x11-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100741" comment="dbus-1-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100742" comment="dbus-1-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100743" comment="dbus-1-devel-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100744" comment="dbus-1-devel-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100745" comment="dbus-1-devel-doc-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100746" comment="libdbus-1-3-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100747" comment="libdbus-1-3-32bit-1.6.24-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3639</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639" source="CVE"/>
    <description>
    The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100740" comment="dbus-1-x11-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100741" comment="dbus-1-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100742" comment="dbus-1-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100743" comment="dbus-1-devel-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100744" comment="dbus-1-devel-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100745" comment="dbus-1-devel-doc-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100746" comment="libdbus-1-3-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100747" comment="libdbus-1-3-32bit-1.6.24-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3657</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" source="CVE"/>
    <description>
    The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100855" comment="libvirt-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100856" comment="libvirt-client-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100857" comment="libvirt-client-32bit-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100858" comment="libvirt-devel-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100859" comment="libvirt-devel-32bit-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100860" comment="libvirt-doc-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100861" comment="libvirt-lock-sanlock-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100862" comment="libvirt-python-1.0.2-1.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3660</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" source="CVE"/>
    <description>
    parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101055" comment="libxml2-2-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101056" comment="libxml2-2-32bit-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101057" comment="libxml2-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101058" comment="libxml2-devel-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101059" comment="libxml2-devel-32bit-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101060" comment="libxml2-doc-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101061" comment="libxml2-tools-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101062" comment="python-libxml2-2.9.0-2.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3668</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668" source="CVE"/>
    <description>
    Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101182" comment="apache2-mod_php5-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101183" comment="php5-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101184" comment="php5-bcmath-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101185" comment="php5-bz2-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101186" comment="php5-calendar-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101187" comment="php5-ctype-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101188" comment="php5-curl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101189" comment="php5-dba-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101190" comment="php5-devel-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101191" comment="php5-dom-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101192" comment="php5-enchant-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101193" comment="php5-exif-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101194" comment="php5-fastcgi-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101195" comment="php5-fileinfo-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101196" comment="php5-fpm-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101197" comment="php5-ftp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101198" comment="php5-gd-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101199" comment="php5-gettext-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101200" comment="php5-gmp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101201" comment="php5-iconv-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101202" comment="php5-imap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101203" comment="php5-intl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101204" comment="php5-json-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101205" comment="php5-ldap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101206" comment="php5-mbstring-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101207" comment="php5-mcrypt-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101208" comment="php5-mssql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101209" comment="php5-mysql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101210" comment="php5-odbc-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101211" comment="php5-openssl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101212" comment="php5-pcntl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101213" comment="php5-pdo-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101214" comment="php5-pear-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101215" comment="php5-pgsql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101216" comment="php5-phar-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101217" comment="php5-posix-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101218" comment="php5-pspell-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101219" comment="php5-readline-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101220" comment="php5-shmop-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101221" comment="php5-snmp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101222" comment="php5-soap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101223" comment="php5-sockets-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101224" comment="php5-sqlite-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101225" comment="php5-suhosin-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101226" comment="php5-sysvmsg-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101227" comment="php5-sysvsem-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101228" comment="php5-sysvshm-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101229" comment="php5-tidy-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101230" comment="php5-tokenizer-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101231" comment="php5-wddx-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101232" comment="php5-xmlreader-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101233" comment="php5-xmlrpc-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101234" comment="php5-xmlwriter-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101235" comment="php5-xsl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101236" comment="php5-zip-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101237" comment="php5-zlib-5.3.17-3.38.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3669</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669" source="CVE"/>
    <description>
    Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101182" comment="apache2-mod_php5-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101183" comment="php5-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101184" comment="php5-bcmath-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101185" comment="php5-bz2-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101186" comment="php5-calendar-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101187" comment="php5-ctype-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101188" comment="php5-curl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101189" comment="php5-dba-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101190" comment="php5-devel-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101191" comment="php5-dom-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101192" comment="php5-enchant-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101193" comment="php5-exif-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101194" comment="php5-fastcgi-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101195" comment="php5-fileinfo-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101196" comment="php5-fpm-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101197" comment="php5-ftp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101198" comment="php5-gd-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101199" comment="php5-gettext-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101200" comment="php5-gmp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101201" comment="php5-iconv-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101202" comment="php5-imap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101203" comment="php5-intl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101204" comment="php5-json-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101205" comment="php5-ldap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101206" comment="php5-mbstring-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101207" comment="php5-mcrypt-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101208" comment="php5-mssql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101209" comment="php5-mysql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101210" comment="php5-odbc-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101211" comment="php5-openssl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101212" comment="php5-pcntl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101213" comment="php5-pdo-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101214" comment="php5-pear-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101215" comment="php5-pgsql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101216" comment="php5-phar-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101217" comment="php5-posix-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101218" comment="php5-pspell-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101219" comment="php5-readline-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101220" comment="php5-shmop-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101221" comment="php5-snmp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101222" comment="php5-soap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101223" comment="php5-sockets-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101224" comment="php5-sqlite-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101225" comment="php5-suhosin-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101226" comment="php5-sysvmsg-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101227" comment="php5-sysvsem-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101228" comment="php5-sysvshm-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101229" comment="php5-tidy-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101230" comment="php5-tokenizer-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101231" comment="php5-wddx-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101232" comment="php5-xmlreader-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101233" comment="php5-xmlrpc-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101234" comment="php5-xmlwriter-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101235" comment="php5-xsl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101236" comment="php5-zip-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101237" comment="php5-zlib-5.3.17-3.38.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3670</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670" source="CVE"/>
    <description>
    The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101182" comment="apache2-mod_php5-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101183" comment="php5-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101184" comment="php5-bcmath-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101185" comment="php5-bz2-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101186" comment="php5-calendar-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101187" comment="php5-ctype-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101188" comment="php5-curl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101189" comment="php5-dba-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101190" comment="php5-devel-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101191" comment="php5-dom-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101192" comment="php5-enchant-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101193" comment="php5-exif-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101194" comment="php5-fastcgi-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101195" comment="php5-fileinfo-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101196" comment="php5-fpm-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101197" comment="php5-ftp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101198" comment="php5-gd-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101199" comment="php5-gettext-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101200" comment="php5-gmp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101201" comment="php5-iconv-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101202" comment="php5-imap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101203" comment="php5-intl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101204" comment="php5-json-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101205" comment="php5-ldap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101206" comment="php5-mbstring-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101207" comment="php5-mcrypt-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101208" comment="php5-mssql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101209" comment="php5-mysql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101210" comment="php5-odbc-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101211" comment="php5-openssl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101212" comment="php5-pcntl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101213" comment="php5-pdo-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101214" comment="php5-pear-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101215" comment="php5-pgsql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101216" comment="php5-phar-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101217" comment="php5-posix-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101218" comment="php5-pspell-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101219" comment="php5-readline-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101220" comment="php5-shmop-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101221" comment="php5-snmp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101222" comment="php5-soap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101223" comment="php5-sockets-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101224" comment="php5-sqlite-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101225" comment="php5-suhosin-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101226" comment="php5-sysvmsg-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101227" comment="php5-sysvsem-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101228" comment="php5-sysvshm-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101229" comment="php5-tidy-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101230" comment="php5-tokenizer-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101231" comment="php5-wddx-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101232" comment="php5-xmlreader-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101233" comment="php5-xmlrpc-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101234" comment="php5-xmlwriter-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101235" comment="php5-xsl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101236" comment="php5-zip-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101237" comment="php5-zlib-5.3.17-3.38.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3683</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683" source="CVE"/>
    <description>
    Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100928" comment="rsyslog-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100929" comment="rsyslog-diag-tools-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100930" comment="rsyslog-doc-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100931" comment="rsyslog-module-dbi-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100932" comment="rsyslog-module-elasticsearch-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100933" comment="rsyslog-module-gssapi-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100934" comment="rsyslog-module-gtls-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100935" comment="rsyslog-module-mmnormalize-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100936" comment="rsyslog-module-mysql-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100937" comment="rsyslog-module-pgsql-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100938" comment="rsyslog-module-relp-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100939" comment="rsyslog-module-snmp-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100940" comment="rsyslog-module-udpspoof-7.2.7-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3686</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686" source="CVE"/>
    <description>
    wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100993" comment="wpa_supplicant-1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100994" comment="wpa_supplicant-gui-1.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3694</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" source="CVE"/>
    <description>
    The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101169" comment="libpurple-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101170" comment="pidgin-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101171" comment="pidgin-otr-4.0.0-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101172" comment="finch-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101173" comment="finch-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101174" comment="libpurple-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101175" comment="libpurple-branding-upstream-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101176" comment="libpurple-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101177" comment="libpurple-lang-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101178" comment="libpurple-meanwhile-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101179" comment="libpurple-tcl-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101180" comment="pidgin-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101181" comment="pidgin-devel-2.10.10-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3695</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" source="CVE"/>
    <description>
    markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101169" comment="libpurple-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101170" comment="pidgin-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101171" comment="pidgin-otr-4.0.0-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101172" comment="finch-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101173" comment="finch-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101174" comment="libpurple-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101175" comment="libpurple-branding-upstream-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101176" comment="libpurple-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101177" comment="libpurple-lang-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101178" comment="libpurple-meanwhile-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101179" comment="libpurple-tcl-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101180" comment="pidgin-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101181" comment="pidgin-devel-2.10.10-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3696</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" source="CVE"/>
    <description>
    nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101169" comment="libpurple-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101170" comment="pidgin-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101171" comment="pidgin-otr-4.0.0-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101172" comment="finch-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101173" comment="finch-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101174" comment="libpurple-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101175" comment="libpurple-branding-upstream-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101176" comment="libpurple-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101177" comment="libpurple-lang-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101178" comment="libpurple-meanwhile-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101179" comment="libpurple-tcl-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101180" comment="pidgin-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101181" comment="pidgin-devel-2.10.10-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3697</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101169" comment="libpurple-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101170" comment="pidgin-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101171" comment="pidgin-otr-4.0.0-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101172" comment="finch-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101173" comment="finch-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101174" comment="libpurple-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101175" comment="libpurple-branding-upstream-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101176" comment="libpurple-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101177" comment="libpurple-lang-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101178" comment="libpurple-meanwhile-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101179" comment="libpurple-tcl-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101180" comment="pidgin-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101181" comment="pidgin-devel-2.10.10-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3698</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" source="CVE"/>
    <description>
    The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101169" comment="libpurple-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101170" comment="pidgin-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101171" comment="pidgin-otr-4.0.0-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101172" comment="finch-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101173" comment="finch-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101174" comment="libpurple-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101175" comment="libpurple-branding-upstream-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101176" comment="libpurple-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101177" comment="libpurple-lang-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101178" comment="libpurple-meanwhile-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101179" comment="libpurple-tcl-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101180" comment="pidgin-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101181" comment="pidgin-devel-2.10.10-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3710</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" source="CVE"/>
    <description>
    The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102102" comment="file-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102103" comment="file-devel-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102104" comment="libmagic-data-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102105" comment="libmagic1-32bit-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102106" comment="libmagic1-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102107" comment="python-magic-5.11-12.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3730</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3730" source="CVE"/>
    <description>
    The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3755</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3755" source="CVE"/>
    <description>
    The QSvg module in Qt, as used in the Mumble client 1.2.x before 1.2.6, allows remote attackers to cause a denial of service (hang and resource consumption) via a local file reference in an (1) image tag or (2) XML stylesheet in an SVG file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096077" comment="mumble-1.2.6-21.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096078" comment="mumble-32bit-1.2.6-21.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096079" comment="mumble-server-1.2.6-21.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3756</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3756" source="CVE"/>
    <description>
    The client in Mumble 1.2.x before 1.2.6 allows remote attackers to force the loading of an external file and cause a denial of service (hang and resource consumption) via a crafted string that is treated as rich-text by a Qt widget, as demonstrated by the (1) user or (2) channel name in a Qt dialog, (3) subject common name or (4) email address to the Certificate Wizard, or (5) server name in a tooltip.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096077" comment="mumble-1.2.6-21.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096078" comment="mumble-32bit-1.2.6-21.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096079" comment="mumble-server-1.2.6-21.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3775</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3775" source="CVE"/>
    <description>
    libgadu before 1.11.4 and 1.12.0 before 1.12.0-rc3, as used in Pidgin and other products, allows remote Gadu-Gadu file relay servers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096132" comment="libgadu-1.11.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096133" comment="libgadu-devel-1.11.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096134" comment="libgadu3-1.11.4-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3917</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917" source="CVE"/>
    <description>
    kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3941</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941" source="CVE"/>
    <description>
    TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096690" comment="typo3-cms-4_5-4.5.34-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3942</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942" source="CVE"/>
    <description>
    The Color Picker Wizard component in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, and 6.1.0 before 6.1.9 allows remote authenticated editors to execute arbitrary PHP code via a serialized PHP object.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096690" comment="typo3-cms-4_5-4.5.34-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3943</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allow remote authenticated editors to inject arbitrary web script or HTML via unknown parameters.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096690" comment="typo3-cms-4_5-4.5.34-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3956</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956" source="CVE"/>
    <description>
    The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096676" comment="rmail-8.14.3-85.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096677" comment="sendmail-8.14.5-85.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096678" comment="sendmail-devel-8.14.5-85.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096679" comment="uucp-1.07-85.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3967</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967" source="CVE"/>
    <description>
    The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x does not properly check the return value from the IRQ setup check, which allows local HVM guest administrators to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3968</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968" source="CVE"/>
    <description>
    The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x allows local guest HVM administrators to cause a denial of service (host crash) via a large number of crafted requests, which trigger an error messages to be logged.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3970</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970" source="CVE"/>
    <description>
    The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099114" comment="libpulse-devel-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099115" comment="libpulse-mainloop-glib0-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099116" comment="libpulse-mainloop-glib0-32bit-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099117" comment="libpulse0-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099118" comment="libpulse0-32bit-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099119" comment="pulseaudio-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099120" comment="pulseaudio-esound-compat-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099121" comment="pulseaudio-gdm-hooks-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099122" comment="pulseaudio-lang-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099123" comment="pulseaudio-module-bluetooth-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099124" comment="pulseaudio-module-gconf-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099125" comment="pulseaudio-module-jack-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099126" comment="pulseaudio-module-lirc-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099127" comment="pulseaudio-module-x11-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099128" comment="pulseaudio-module-zeroconf-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099129" comment="pulseaudio-utils-3.0-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3985</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3985" source="CVE"/>
    <description>
    The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows remote attackers to cause a denial of service (crash) via crafted headers that trigger an out-of-bounds read.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096692" comment="libminiupnpc-devel-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096693" comment="libminiupnpc10-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096694" comment="miniupnpc-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096695" comment="python-miniupnpc-1.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4014</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4014" source="CVE"/>
    <description>
    The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4021</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" source="CVE"/>
    <description>
    Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4049</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049" source="CVE"/>
    <description>
    Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096916" comment="apache2-mod_php5-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096917" comment="php5-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096918" comment="php5-bcmath-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096919" comment="php5-bz2-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096920" comment="php5-calendar-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096921" comment="php5-ctype-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096922" comment="php5-curl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096923" comment="php5-dba-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096924" comment="php5-devel-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096925" comment="php5-dom-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096926" comment="php5-enchant-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096927" comment="php5-exif-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096928" comment="php5-fastcgi-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096929" comment="php5-fileinfo-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096930" comment="php5-fpm-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096931" comment="php5-ftp-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096932" comment="php5-gd-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096933" comment="php5-gettext-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096934" comment="php5-gmp-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096935" comment="php5-iconv-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096936" comment="php5-imap-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096937" comment="php5-intl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096938" comment="php5-json-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096939" comment="php5-ldap-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096940" comment="php5-mbstring-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096941" comment="php5-mcrypt-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096942" comment="php5-mssql-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096943" comment="php5-mysql-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096944" comment="php5-odbc-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096945" comment="php5-openssl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096946" comment="php5-pcntl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096947" comment="php5-pdo-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096948" comment="php5-pear-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096949" comment="php5-pgsql-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096950" comment="php5-phar-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096951" comment="php5-posix-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096952" comment="php5-pspell-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096953" comment="php5-readline-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096954" comment="php5-shmop-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096955" comment="php5-snmp-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096956" comment="php5-soap-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096957" comment="php5-sockets-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096958" comment="php5-sqlite-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096959" comment="php5-suhosin-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096960" comment="php5-sysvmsg-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096961" comment="php5-sysvsem-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096962" comment="php5-sysvshm-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096963" comment="php5-tidy-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096964" comment="php5-tokenizer-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096965" comment="php5-wddx-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096966" comment="php5-xmlreader-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096967" comment="php5-xmlrpc-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096968" comment="php5-xmlwriter-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096969" comment="php5-xsl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096970" comment="php5-zip-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096971" comment="php5-zlib-5.3.17-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4171</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171" source="CVE"/>
    <description>
    mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4209</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4209" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4216</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4216" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4218</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4218" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4219</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4219" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4221</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4221" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4223</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4223" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-2483.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4244</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4244" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4252</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4252" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4262</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4262" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4263</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4263" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4264</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4264" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4266</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4266" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Serviceability.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4268</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4268" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4341</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099274" comment="krb5-doc-1.10.2-10.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099275" comment="krb5-mini-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099276" comment="krb5-mini-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099277" comment="krb5-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099278" comment="krb5-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099279" comment="krb5-client-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099280" comment="krb5-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099281" comment="krb5-devel-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099282" comment="krb5-plugin-kdb-ldap-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099283" comment="krb5-plugin-preauth-pkinit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099284" comment="krb5-server-1.10.2-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4342</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099274" comment="krb5-doc-1.10.2-10.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099275" comment="krb5-mini-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099276" comment="krb5-mini-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099277" comment="krb5-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099278" comment="krb5-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099279" comment="krb5-client-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099280" comment="krb5-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099281" comment="krb5-devel-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099282" comment="krb5-plugin-kdb-ldap-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099283" comment="krb5-plugin-preauth-pkinit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099284" comment="krb5-server-1.10.2-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4343</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343" source="CVE"/>
    <description>
    Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099274" comment="krb5-doc-1.10.2-10.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099275" comment="krb5-mini-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099276" comment="krb5-mini-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099277" comment="krb5-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099278" comment="krb5-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099279" comment="krb5-client-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099280" comment="krb5-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099281" comment="krb5-devel-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099282" comment="krb5-plugin-kdb-ldap-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099283" comment="krb5-plugin-preauth-pkinit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099284" comment="krb5-server-1.10.2-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4344</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344" source="CVE"/>
    <description>
    The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099274" comment="krb5-doc-1.10.2-10.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099275" comment="krb5-mini-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099276" comment="krb5-mini-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099277" comment="krb5-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099278" comment="krb5-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099279" comment="krb5-client-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099280" comment="krb5-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099281" comment="krb5-devel-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099282" comment="krb5-plugin-kdb-ldap-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099283" comment="krb5-plugin-preauth-pkinit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099284" comment="krb5-server-1.10.2-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4345</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" source="CVE"/>
    <description>
    Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099617" comment="krb5-doc-1.10.2-10.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099618" comment="krb5-mini-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099619" comment="krb5-mini-devel-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099620" comment="krb5-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099621" comment="krb5-32bit-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099622" comment="krb5-client-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099623" comment="krb5-devel-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099624" comment="krb5-devel-32bit-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099625" comment="krb5-plugin-kdb-ldap-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099626" comment="krb5-plugin-preauth-pkinit-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099627" comment="krb5-server-1.10.2-10.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4349</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4349" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.1.x before 4.1.14.1 and 4.2.x before 4.2.4 allow remote authenticated users to inject arbitrary web script or HTML via a crafted table name that is improperly handled after a (1) hide or (2) unhide action.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099908" comment="phpMyAdmin-4.1.14.3-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4508</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508" source="CVE"/>
    <description>
    arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4608</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608" source="CVE"/>
    <description>
    ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run.  NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4611</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611" source="CVE"/>
    <description>
    Integer overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib/lz4/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run that would be improperly handled by programs not complying with an API limitation, a different vulnerability than CVE-2014-4715.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098244" comment="eet-1.7.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098245" comment="eet-devel-1.7.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098246" comment="eet-doc-html-1.7.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098247" comment="eet-examples-1.7.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098248" comment="libeet1-1.7.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4616</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4616" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097806" comment="libpython2_7-1_0-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097807" comment="libpython2_7-1_0-32bit-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097808" comment="python-base-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097809" comment="python-base-32bit-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097810" comment="python-devel-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097811" comment="python-xml-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097812" comment="python-doc-2.7-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097813" comment="python-doc-pdf-2.7-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097814" comment="python-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097815" comment="python-32bit-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097816" comment="python-curses-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097817" comment="python-demo-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097818" comment="python-gdbm-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097819" comment="python-idle-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097820" comment="python-tk-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097821" comment="libpython3_3m1_0-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097822" comment="libpython3_3m1_0-32bit-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097823" comment="python3-base-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097824" comment="python3-base-32bit-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097825" comment="python3-devel-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097826" comment="python3-idle-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097827" comment="python3-testsuite-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097828" comment="python3-tools-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097829" comment="python3-doc-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097830" comment="python3-doc-pdf-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097831" comment="python3-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097832" comment="python3-32bit-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097833" comment="python3-curses-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097834" comment="python3-dbm-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097835" comment="python3-tk-3.3.0-6.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4617</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617" source="CVE"/>
    <description>
    The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097489" comment="gpg2-2.0.19-5.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097490" comment="gpg2-lang-2.0.19-5.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099598" comment="libpython2_7-1_0-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099599" comment="libpython2_7-1_0-32bit-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099600" comment="python-base-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099601" comment="python-base-32bit-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099602" comment="python-devel-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099603" comment="python-xml-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099604" comment="python-doc-2.7-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099605" comment="python-doc-pdf-2.7-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099606" comment="python-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099607" comment="python-32bit-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099608" comment="python-curses-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099609" comment="python-demo-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099610" comment="python-gdbm-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099611" comment="python-idle-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099612" comment="python-tk-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099893" comment="libpython3_3m1_0-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099894" comment="libpython3_3m1_0-32bit-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099895" comment="python3-base-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099896" comment="python3-base-32bit-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099897" comment="python3-devel-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099898" comment="python3-idle-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099899" comment="python3-testsuite-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099900" comment="python3-tools-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099901" comment="python3-doc-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099902" comment="python3-doc-pdf-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099903" comment="python3-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099904" comment="python3-32bit-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099905" comment="python3-curses-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099906" comment="python3-dbm-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099907" comment="python3-tk-3.3.0-6.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4652</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652" source="CVE"/>
    <description>
    Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4653</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653" source="CVE"/>
    <description>
    sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4654</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654" source="CVE"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4655</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655" source="CVE"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4656</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656" source="CVE"/>
    <description>
    Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4667</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667" source="CVE"/>
    <description>
    The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4670</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670" source="CVE"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099056" comment="apache2-mod_php5-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099057" comment="php5-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099058" comment="php5-bcmath-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099059" comment="php5-bz2-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099060" comment="php5-calendar-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099061" comment="php5-ctype-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099062" comment="php5-curl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099063" comment="php5-dba-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099064" comment="php5-devel-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099065" comment="php5-dom-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099066" comment="php5-enchant-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099067" comment="php5-exif-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099068" comment="php5-fastcgi-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099069" comment="php5-fileinfo-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099070" comment="php5-fpm-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099071" comment="php5-ftp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099072" comment="php5-gd-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099073" comment="php5-gettext-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099074" comment="php5-gmp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099075" comment="php5-iconv-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099076" comment="php5-imap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099077" comment="php5-intl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099078" comment="php5-json-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099079" comment="php5-ldap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099080" comment="php5-mbstring-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099081" comment="php5-mcrypt-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099082" comment="php5-mssql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099083" comment="php5-mysql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099084" comment="php5-odbc-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099085" comment="php5-openssl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099086" comment="php5-pcntl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099087" comment="php5-pdo-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099088" comment="php5-pear-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099089" comment="php5-pgsql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099090" comment="php5-phar-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099091" comment="php5-posix-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099092" comment="php5-pspell-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099093" comment="php5-readline-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099094" comment="php5-shmop-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099095" comment="php5-snmp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099096" comment="php5-soap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099097" comment="php5-sockets-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099098" comment="php5-sqlite-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099099" comment="php5-suhosin-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099100" comment="php5-sysvmsg-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099101" comment="php5-sysvsem-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099102" comment="php5-sysvshm-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099103" comment="php5-tidy-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099104" comment="php5-tokenizer-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099105" comment="php5-wddx-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099106" comment="php5-xmlreader-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099107" comment="php5-xmlrpc-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099108" comment="php5-xmlwriter-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099109" comment="php5-xsl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099110" comment="php5-zip-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099111" comment="php5-zlib-5.3.17-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4698</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698" source="CVE"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099056" comment="apache2-mod_php5-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099057" comment="php5-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099058" comment="php5-bcmath-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099059" comment="php5-bz2-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099060" comment="php5-calendar-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099061" comment="php5-ctype-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099062" comment="php5-curl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099063" comment="php5-dba-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099064" comment="php5-devel-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099065" comment="php5-dom-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099066" comment="php5-enchant-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099067" comment="php5-exif-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099068" comment="php5-fastcgi-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099069" comment="php5-fileinfo-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099070" comment="php5-fpm-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099071" comment="php5-ftp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099072" comment="php5-gd-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099073" comment="php5-gettext-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099074" comment="php5-gmp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099075" comment="php5-iconv-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099076" comment="php5-imap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099077" comment="php5-intl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099078" comment="php5-json-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099079" comment="php5-ldap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099080" comment="php5-mbstring-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099081" comment="php5-mcrypt-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099082" comment="php5-mssql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099083" comment="php5-mysql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099084" comment="php5-odbc-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099085" comment="php5-openssl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099086" comment="php5-pcntl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099087" comment="php5-pdo-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099088" comment="php5-pear-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099089" comment="php5-pgsql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099090" comment="php5-phar-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099091" comment="php5-posix-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099092" comment="php5-pspell-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099093" comment="php5-readline-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099094" comment="php5-shmop-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099095" comment="php5-snmp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099096" comment="php5-soap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099097" comment="php5-sockets-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099098" comment="php5-sqlite-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099099" comment="php5-suhosin-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099100" comment="php5-sysvmsg-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099101" comment="php5-sysvsem-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099102" comment="php5-sysvshm-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099103" comment="php5-tidy-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099104" comment="php5-tokenizer-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099105" comment="php5-wddx-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099106" comment="php5-xmlreader-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099107" comment="php5-xmlrpc-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099108" comment="php5-xmlwriter-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099109" comment="php5-xsl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099110" comment="php5-zip-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099111" comment="php5-zlib-5.3.17-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4699</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699" source="CVE"/>
    <description>
    The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4721</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4721" source="CVE"/>
    <description>
    The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099056" comment="apache2-mod_php5-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099057" comment="php5-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099058" comment="php5-bcmath-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099059" comment="php5-bz2-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099060" comment="php5-calendar-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099061" comment="php5-ctype-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099062" comment="php5-curl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099063" comment="php5-dba-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099064" comment="php5-devel-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099065" comment="php5-dom-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099066" comment="php5-enchant-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099067" comment="php5-exif-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099068" comment="php5-fastcgi-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099069" comment="php5-fileinfo-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099070" comment="php5-fpm-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099071" comment="php5-ftp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099072" comment="php5-gd-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099073" comment="php5-gettext-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099074" comment="php5-gmp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099075" comment="php5-iconv-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099076" comment="php5-imap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099077" comment="php5-intl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099078" comment="php5-json-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099079" comment="php5-ldap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099080" comment="php5-mbstring-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099081" comment="php5-mcrypt-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099082" comment="php5-mssql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099083" comment="php5-mysql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099084" comment="php5-odbc-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099085" comment="php5-openssl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099086" comment="php5-pcntl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099087" comment="php5-pdo-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099088" comment="php5-pear-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099089" comment="php5-pgsql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099090" comment="php5-phar-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099091" comment="php5-posix-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099092" comment="php5-pspell-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099093" comment="php5-readline-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099094" comment="php5-shmop-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099095" comment="php5-snmp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099096" comment="php5-soap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099097" comment="php5-sockets-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099098" comment="php5-sqlite-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099099" comment="php5-suhosin-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099100" comment="php5-sysvmsg-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099101" comment="php5-sysvsem-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099102" comment="php5-sysvshm-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099103" comment="php5-tidy-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099104" comment="php5-tokenizer-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099105" comment="php5-wddx-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099106" comment="php5-xmlreader-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099107" comment="php5-xmlrpc-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099108" comment="php5-xmlwriter-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099109" comment="php5-xsl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099110" comment="php5-zip-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099111" comment="php5-zlib-5.3.17-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4877</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101243" comment="wget-1.16-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4943</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943" source="CVE"/>
    <description>
    The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4955</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4955" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the PMA_TRI_getRowForList function in libraries/rte/rte_list.lib.php in phpMyAdmin 4.0.x before 4.0.10.1, 4.1.x before 4.1.14.2, and 4.2.x before 4.2.6 allows remote authenticated users to inject arbitrary web script or HTML via a crafted trigger name that is improperly handled on the database triggers page.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099908" comment="phpMyAdmin-4.1.14.3-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4986</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4986" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in js/functions.js in phpMyAdmin 4.0.x before 4.0.10.1, 4.1.x before 4.1.14.2, and 4.2.x before 4.2.6 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) table name or (2) column name that is improperly handled during construction of an AJAX confirmation message.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099908" comment="phpMyAdmin-4.1.14.3-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4987</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-4987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4987" source="CVE"/>
    <description>
    server_user_groups.php in phpMyAdmin 4.1.x before 4.1.14.2 and 4.2.x before 4.2.6 allows remote authenticated users to bypass intended access restrictions and read the MySQL user list via a viewUsers request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099908" comment="phpMyAdmin-4.1.14.3-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5077</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077" source="CVE"/>
    <description>
    The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5117</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5117" source="CVE"/>
    <description>
    Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099304" comment="tor-0.2.4.23-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5119</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" source="CVE"/>
    <description>
    Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100031" comment="glibc-testsuite-2.17-4.13.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100032" comment="glibc-utils-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100033" comment="glibc-utils-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100034" comment="glibc-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100035" comment="glibc-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100036" comment="glibc-devel-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100037" comment="glibc-devel-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100038" comment="glibc-devel-static-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100039" comment="glibc-devel-static-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100040" comment="glibc-extra-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100041" comment="glibc-i18ndata-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100042" comment="glibc-info-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100043" comment="glibc-locale-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100044" comment="glibc-locale-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100045" comment="glibc-obsolete-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100046" comment="glibc-profile-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100047" comment="glibc-profile-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100048" comment="nscd-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100049" comment="glibc-html-2.17-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5120</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120" source="CVE"/>
    <description>
    gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100470" comment="apache2-mod_php5-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100471" comment="php5-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100472" comment="php5-bcmath-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100473" comment="php5-bz2-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100474" comment="php5-calendar-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100475" comment="php5-ctype-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100476" comment="php5-curl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100477" comment="php5-dba-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100478" comment="php5-devel-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100479" comment="php5-dom-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100480" comment="php5-enchant-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100481" comment="php5-exif-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100482" comment="php5-fastcgi-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100483" comment="php5-fileinfo-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100484" comment="php5-fpm-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100485" comment="php5-ftp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100486" comment="php5-gd-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100487" comment="php5-gettext-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100488" comment="php5-gmp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100489" comment="php5-iconv-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100490" comment="php5-imap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100491" comment="php5-intl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100492" comment="php5-json-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100493" comment="php5-ldap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100494" comment="php5-mbstring-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100495" comment="php5-mcrypt-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100496" comment="php5-mssql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100497" comment="php5-mysql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100498" comment="php5-odbc-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100499" comment="php5-openssl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100500" comment="php5-pcntl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100501" comment="php5-pdo-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100502" comment="php5-pear-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100503" comment="php5-pgsql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100504" comment="php5-phar-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100505" comment="php5-posix-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100506" comment="php5-pspell-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100507" comment="php5-readline-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100508" comment="php5-shmop-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100509" comment="php5-snmp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100510" comment="php5-soap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100511" comment="php5-sockets-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100512" comment="php5-sqlite-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100513" comment="php5-suhosin-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100514" comment="php5-sysvmsg-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100515" comment="php5-sysvsem-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100516" comment="php5-sysvshm-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100517" comment="php5-tidy-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100518" comment="php5-tokenizer-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100519" comment="php5-wddx-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100520" comment="php5-xmlreader-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100521" comment="php5-xmlrpc-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100522" comment="php5-xmlwriter-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100523" comment="php5-xsl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100524" comment="php5-zip-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100525" comment="php5-zlib-5.3.17-3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5139</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139" source="CVE"/>
    <description>
    The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5161</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161" source="CVE"/>
    <description>
    The dissect_log function in plugins/irda/packet-irda.c in the IrDA dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5162</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162" source="CVE"/>
    <description>
    The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000 dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' and '\r' characters, which allows remote attackers to cause a denial of service (off-by-one buffer underflow and application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5163</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163" source="CVE"/>
    <description>
    The APN decode functionality in (1) epan/dissectors/packet-gtp.c and (2) epan/dissectors/packet-gsm_a_gm.c in the GTP and GSM Management dissectors in Wireshark 1.10.x before 1.10.9 does not completely initialize a certain buffer, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5164</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164" source="CVE"/>
    <description>
    The rlc_decode_li function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.10.x before 1.10.9 initializes a certain structure member only after this member is used, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5165</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165" source="CVE"/>
    <description>
    The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.10.x before 1.10.9 does not properly validate padding values, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5273</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5273" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.2, 4.1.x before 4.1.14.3, and 4.2.x before 4.2.7.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) browse table page, related to js/sql.js; (2) ENUM editor page, related to js/functions.js; (3) monitor page, related to js/server_status_monitor.js; (4) query charts page, related to js/tbl_chart.js; or (5) table relations page, related to libraries/tbl_relation.lib.php.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099908" comment="phpMyAdmin-4.1.14.3-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5274</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5274" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the view operations page in phpMyAdmin 4.1.x before 4.1.14.3 and 4.2.x before 4.2.7.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted view name, related to js/functions.js.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099908" comment="phpMyAdmin-4.1.14.3-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5369</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5369" source="CVE"/>
    <description>
    Enigmail 1.7.x before 1.7.2 sends emails in plaintext when encryption is enabled and only BCC recipients are specified, which allows remote attackers to obtain sensitive information by sniffing the network.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099943" comment="enigmail-1.7.2-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5459</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5459" source="CVE"/>
    <description>
    The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100470" comment="apache2-mod_php5-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100471" comment="php5-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100472" comment="php5-bcmath-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100473" comment="php5-bz2-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100474" comment="php5-calendar-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100475" comment="php5-ctype-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100476" comment="php5-curl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100477" comment="php5-dba-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100478" comment="php5-devel-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100479" comment="php5-dom-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100480" comment="php5-enchant-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100481" comment="php5-exif-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100482" comment="php5-fastcgi-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100483" comment="php5-fileinfo-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100484" comment="php5-fpm-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100485" comment="php5-ftp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100486" comment="php5-gd-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100487" comment="php5-gettext-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100488" comment="php5-gmp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100489" comment="php5-iconv-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100490" comment="php5-imap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100491" comment="php5-intl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100492" comment="php5-json-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100493" comment="php5-ldap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100494" comment="php5-mbstring-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100495" comment="php5-mcrypt-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100496" comment="php5-mssql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100497" comment="php5-mysql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100498" comment="php5-odbc-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100499" comment="php5-openssl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100500" comment="php5-pcntl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100501" comment="php5-pdo-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100502" comment="php5-pear-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100503" comment="php5-pgsql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100504" comment="php5-phar-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100505" comment="php5-posix-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100506" comment="php5-pspell-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100507" comment="php5-readline-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100508" comment="php5-shmop-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100509" comment="php5-snmp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100510" comment="php5-soap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100511" comment="php5-sockets-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100512" comment="php5-sqlite-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100513" comment="php5-suhosin-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100514" comment="php5-sysvmsg-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100515" comment="php5-sysvsem-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100516" comment="php5-sysvshm-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100517" comment="php5-tidy-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100518" comment="php5-tokenizer-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100519" comment="php5-wddx-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100520" comment="php5-xmlreader-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100521" comment="php5-xmlrpc-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100522" comment="php5-xmlwriter-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100523" comment="php5-xsl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100524" comment="php5-zip-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100525" comment="php5-zlib-5.3.17-3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5461</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5461" source="CVE"/>
    <description>
    Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100681" comment="liblua5_2-32bit-5.2.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100682" comment="liblua5_2-5.2.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100683" comment="lua-5.2.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100684" comment="lua-devel-5.2.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100685" comment="lua-doc-5.2.1-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5471</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471" source="CVE"/>
    <description>
    Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5472</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-5472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472" source="CVE"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6040</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" source="CVE"/>
    <description>
    GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100031" comment="glibc-testsuite-2.17-4.13.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100032" comment="glibc-utils-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100033" comment="glibc-utils-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100034" comment="glibc-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100035" comment="glibc-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100036" comment="glibc-devel-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100037" comment="glibc-devel-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100038" comment="glibc-devel-static-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100039" comment="glibc-devel-static-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100040" comment="glibc-extra-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100041" comment="glibc-i18ndata-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100042" comment="glibc-info-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100043" comment="glibc-locale-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100044" comment="glibc-locale-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100045" comment="glibc-obsolete-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100046" comment="glibc-profile-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100047" comment="glibc-profile-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100048" comment="nscd-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100049" comment="glibc-html-2.17-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6271</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" source="CVE"/>
    <description>
    GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100748" comment="bash-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100749" comment="bash-devel-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100750" comment="bash-doc-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100751" comment="bash-lang-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100752" comment="bash-loadables-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100753" comment="libreadline6-32bit-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100754" comment="libreadline6-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100755" comment="readline-devel-32bit-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100756" comment="readline-devel-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100757" comment="readline-doc-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100971" comment="bash-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100972" comment="bash-devel-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100973" comment="bash-doc-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100974" comment="bash-lang-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100975" comment="bash-loadables-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100976" comment="libreadline6-32bit-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100977" comment="libreadline6-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100978" comment="readline-devel-32bit-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100979" comment="readline-devel-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100980" comment="readline-doc-6.2-61.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6300</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6300" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the micro history implementation in phpMyAdmin 4.0.x before 4.0.10.3, 4.1.x before 4.1.14.4, and 4.2.x before 4.2.8.1 allows remote attackers to inject arbitrary web script or HTML, and consequently conduct a cross-site request forgery (CSRF) attack to create a root account, via a crafted URL, related to js/ajax.js.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100739" comment="phpMyAdmin-4.1.14.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6410</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410" source="CVE"/>
    <description>
    The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6421</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6422</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422" source="CVE"/>
    <description>
    The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6423</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423" source="CVE"/>
    <description>
    The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6424</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424" source="CVE"/>
    <description>
    The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6427</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427" source="CVE"/>
    <description>
    Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6428</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428" source="CVE"/>
    <description>
    The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6429</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6430</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6431</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431" source="CVE"/>
    <description>
    Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6432</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-6432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7154</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154" source="CVE"/>
    <description>
    Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7155</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155" source="CVE"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7156</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156" source="CVE"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7169</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100770" comment="bash-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100771" comment="bash-devel-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100772" comment="bash-doc-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100773" comment="bash-lang-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100774" comment="bash-loadables-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100775" comment="libreadline6-32bit-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100776" comment="libreadline6-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100777" comment="readline-devel-32bit-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100778" comment="readline-devel-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100779" comment="readline-doc-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100971" comment="bash-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100972" comment="bash-devel-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100973" comment="bash-doc-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100974" comment="bash-lang-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100975" comment="bash-loadables-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100976" comment="libreadline6-32bit-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100977" comment="libreadline6-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100978" comment="readline-devel-32bit-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100979" comment="readline-devel-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100980" comment="readline-doc-6.2-61.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7185</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185" source="CVE"/>
    <description>
    Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100863" comment="libpython2_7-1_0-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100864" comment="libpython2_7-1_0-32bit-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100865" comment="python-base-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100866" comment="python-base-32bit-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100867" comment="python-devel-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100868" comment="python-xml-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100869" comment="python-doc-2.7-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100870" comment="python-doc-pdf-2.7-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100871" comment="python-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100872" comment="python-32bit-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100873" comment="python-curses-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100874" comment="python-demo-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100875" comment="python-gdbm-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100876" comment="python-idle-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100877" comment="python-tk-2.7.3-10.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7186</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" source="CVE"/>
    <description>
    The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100770" comment="bash-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100771" comment="bash-devel-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100772" comment="bash-doc-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100773" comment="bash-lang-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100774" comment="bash-loadables-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100775" comment="libreadline6-32bit-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100776" comment="libreadline6-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100777" comment="readline-devel-32bit-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100778" comment="readline-devel-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100779" comment="readline-doc-6.2-61.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7187</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" source="CVE"/>
    <description>
    Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100770" comment="bash-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100771" comment="bash-devel-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100772" comment="bash-doc-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100773" comment="bash-lang-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100774" comment="bash-loadables-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100775" comment="libreadline6-32bit-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100776" comment="libreadline6-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100777" comment="readline-devel-32bit-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100778" comment="readline-devel-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100779" comment="readline-doc-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100971" comment="bash-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100972" comment="bash-devel-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100973" comment="bash-doc-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100974" comment="bash-lang-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100975" comment="bash-loadables-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100976" comment="libreadline6-32bit-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100977" comment="libreadline6-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100978" comment="readline-devel-32bit-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100979" comment="readline-devel-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100980" comment="readline-doc-6.2-61.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7188</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188" source="CVE"/>
    <description>
    The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7202</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7202" source="CVE"/>
    <description>
    stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows man-in-the-middle attackers to conduct downgrade attacks via a crafted connection request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101166" comment="libzmq4-4.0.5-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101167" comment="zeromq-4.0.5-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101168" comment="zeromq-devel-4.0.5-2.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7203</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7203" source="CVE"/>
    <description>
    libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101166" comment="libzmq4-4.0.5-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101167" comment="zeromq-4.0.5-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101168" comment="zeromq-devel-4.0.5-2.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7217</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7217" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.4, 4.1.x before 4.1.14.5, and 4.2.x before 4.2.9.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted ENUM value that is improperly handled during rendering of the (1) table search or (2) table structure page, related to libraries/TableSearch.class.php and libraries/Util.class.php.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100842" comment="phpMyAdmin-4.1.14.5-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7273</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7273" source="CVE"/>
    <description>
    The IMAP-over-SSL implementation in getmail 4.0.0 through 4.43.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof IMAP servers and obtain sensitive information via a crafted certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100991" comment="getmail-4.46.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100992" comment="getmail-doc-4.46.0-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7274</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7274" source="CVE"/>
    <description>
    The IMAP-over-SSL implementation in getmail 4.44.0 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IMAP servers and obtain sensitive information via a crafted certificate from a recognized Certification Authority.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100991" comment="getmail-4.46.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100992" comment="getmail-doc-4.46.0-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7275</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7275" source="CVE"/>
    <description>
    The POP3-over-SSL implementation in getmail 4.0.0 through 4.44.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof POP3 servers and obtain sensitive information via a crafted certificate.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100991" comment="getmail-4.46.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100992" comment="getmail-doc-4.46.0-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7818</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7818" source="CVE"/>
    <description>
    Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102108" comment="rubygem-actionpack-3_2-3.2.12-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102109" comment="rubygem-actionpack-3_2-doc-3.2.12-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7819</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7819" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102080" comment="rubygem-sprockets-2_2-2.2.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102081" comment="rubygem-sprockets-2_2-doc-2.2.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102082" comment="rubygem-sprockets-2_1-2.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102083" comment="rubygem-sprockets-2_1-doc-2.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102100" comment="rubygem-sprockets-2.8.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102101" comment="rubygem-sprockets-doc-2.8.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7823</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" source="CVE"/>
    <description>
    The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101916" comment="libvirt-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101917" comment="libvirt-client-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101918" comment="libvirt-client-32bit-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101919" comment="libvirt-devel-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101920" comment="libvirt-devel-32bit-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101921" comment="libvirt-doc-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101922" comment="libvirt-lock-sanlock-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101923" comment="libvirt-python-1.0.2-1.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7824</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824" source="CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101880" comment="dbus-1-x11-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101881" comment="dbus-1-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101882" comment="dbus-1-32bit-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101883" comment="dbus-1-devel-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101884" comment="dbus-1-devel-32bit-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101885" comment="dbus-1-devel-doc-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101886" comment="libdbus-1-3-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101887" comment="libdbus-1-3-32bit-1.6.26-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7826</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826" source="CVE"/>
    <description>
    kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7829</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7829" source="CVE"/>
    <description>
    Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102108" comment="rubygem-actionpack-3_2-3.2.12-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102109" comment="rubygem-actionpack-3_2-doc-3.2.12-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7841</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841" source="CVE"/>
    <description>
    The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7844</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-7844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103200" comment="mailx-12.5-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8080</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080" source="CVE"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102580" comment="ruby19-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102581" comment="ruby19-devel-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102582" comment="ruby19-devel-extra-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102583" comment="ruby19-doc-ri-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102584" comment="ruby19-tk-1.9.3.p392-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8090</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090" source="CVE"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102580" comment="ruby19-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102581" comment="ruby19-devel-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102582" comment="ruby19-devel-extra-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102583" comment="ruby19-doc-ri-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102584" comment="ruby19-tk-1.9.3.p392-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8091</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091" source="CVE"/>
    <description>
    X.Org X Window System (aka X11 and X) X11R5 and X.Org Server (aka xserver and xorg-server) before 1.16.3, when using SUN-DES-1 (Secure RPC) authentication credentials, does not check the return value of a malloc call, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a crafted connection request.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8092</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092" source="CVE"/>
    <description>
    Multiple integer overflows in X.Org X Window System (aka X11 or X) X11R1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) ProcPutImage, (2) GetHosts, (3) RegionSizeof, or (4) REQUEST_FIXED_SIZE function, which triggers an out-of-bounds read or write.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8093</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093" source="CVE"/>
    <description>
    Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) __glXDisp_ReadPixels, (2) __glXDispSwap_ReadPixels, (3) __glXDisp_GetTexImage, (4) __glXDispSwap_GetTexImage, (5) GetSeparableFilter, (6) GetConvolutionFilter, (7) GetHistogram, (8) GetMinmax, (9) GetColorTable, (10) __glXGetAnswerBuffer, (11) __GLX_GET_ANSWER_BUFFER, (12) __glXMap1dReqSize, (13) __glXMap1fReqSize, (14) Map2Size, (15) __glXMap2dReqSize, (16) __glXMap2fReqSize, (17) __glXImageSize, or (18) __glXSeparableFilter2DReqSize function, which triggers an out-of-bounds read or write.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8094</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094" source="CVE"/>
    <description>
    Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8095</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095" source="CVE"/>
    <description>
    The XInput extension in X.Org X Window System (aka X11 or X) X11R4 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXChangeDeviceControl, (2) ProcXChangeDeviceControl, (3) ProcXChangeFeedbackControl, (4) ProcXSendExtensionEvent, (5) SProcXIAllowEvents, (6) SProcXIChangeCursor, (7) ProcXIChangeHierarchy, (8) SProcXIGetClientPointer, (9) SProcXIGrabDevice, (10) SProcXIUngrabDevice, (11) ProcXIUngrabDevice, (12) SProcXIPassiveGrabDevice, (13) ProcXIPassiveGrabDevice, (14) SProcXIPassiveUngrabDevice, (15) ProcXIPassiveUngrabDevice, (16) SProcXListDeviceProperties, (17) SProcXDeleteDeviceProperty, (18) SProcXIListProperties, (19) SProcXIDeleteProperty, (20) SProcXIGetProperty, (21) SProcXIQueryDevice, (22) SProcXIQueryPointer, (23) SProcXISelectEvents, (24) SProcXISetClientPointer, (25) SProcXISetFocus, (26) SProcXIGetFocus, or (27) SProcXIWarpPointer function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8096</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096" source="CVE"/>
    <description>
    The SProcXCMiscGetXIDList function in the XC-MISC extension in X.Org X Window System (aka X11 or X) X11R6.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8097</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097" source="CVE"/>
    <description>
    The DBE extension in X.Org X Window System (aka X11 or X) X11R6.1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcDbeSwapBuffers or (2) SProcDbeSwapBuffers function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8098</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098" source="CVE"/>
    <description>
    The GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) __glXDisp_Render, (2) __glXDisp_RenderLarge, (3) __glXDispSwap_VendorPrivate, (4) __glXDispSwap_VendorPrivateWithReply, (5) set_client_info, (6) __glXDispSwap_SetClientInfoARB, (7) DoSwapInterval, (8) DoGetProgramString, (9) DoGetString, (10) __glXDispSwap_RenderMode, (11) __glXDisp_GetCompressedTexImage, (12) __glXDispSwap_GetCompressedTexImage, (13) __glXDisp_FeedbackBuffer, (14) __glXDispSwap_FeedbackBuffer, (15) __glXDisp_SelectBuffer, (16) __glXDispSwap_SelectBuffer, (17) __glXDisp_Flush, (18) __glXDispSwap_Flush, (19) __glXDisp_Finish, (20) __glXDispSwap_Finish, (21) __glXDisp_ReadPixels, (22) __glXDispSwap_ReadPixels, (23) __glXDisp_GetTexImage, (24) __glXDispSwap_GetTexImage, (25) __glXDisp_GetPolygonStipple, (26) __glXDispSwap_GetPolygonStipple, (27) __glXDisp_GetSeparableFilter, (28) __glXDisp_GetSeparableFilterEXT, (29) __glXDisp_GetConvolutionFilter, (30) __glXDisp_GetConvolutionFilterEXT, (31) __glXDisp_GetHistogram, (32) __glXDisp_GetHistogramEXT, (33) __glXDisp_GetMinmax, (34) __glXDisp_GetMinmaxEXT, (35) __glXDisp_GetColorTable, (36) __glXDisp_GetColorTableSGI, (37) GetSeparableFilter, (38) GetConvolutionFilter, (39) GetHistogram, (40) GetMinmax, or (41) GetColorTable function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8099</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099" source="CVE"/>
    <description>
    The XVideo extension in XFree86 4.0.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXvQueryExtension, (2) SProcXvQueryAdaptors, (3) SProcXvQueryEncodings, (4) SProcXvGrabPort, (5) SProcXvUngrabPort, (6) SProcXvPutVideo, (7) SProcXvPutStill, (8) SProcXvGetVideo, (9) SProcXvGetStill, (10) SProcXvPutImage, (11) SProcXvShmPutImage, (12) SProcXvSelectVideoNotify, (13) SProcXvSelectPortNotify, (14) SProcXvStopVideo, (15) SProcXvSetPortAttribute, (16) SProcXvGetPortAttribute, (17) SProcXvQueryBestSize, (18) SProcXvQueryPortAttributes, (19) SProcXvQueryImageAttributes, or (20) SProcXvListImageFormats function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8100</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100" source="CVE"/>
    <description>
    The Render extension in XFree86 4.0.1, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcRenderQueryVersion, (2) SProcRenderQueryVersion, (3) SProcRenderQueryPictFormats, (4) SProcRenderQueryPictIndexValues, (5) SProcRenderCreatePicture, (6) SProcRenderChangePicture, (7) SProcRenderSetPictureClipRectangles, (8) SProcRenderFreePicture, (9) SProcRenderComposite, (10) SProcRenderScale, (11) SProcRenderCreateGlyphSet, (12) SProcRenderReferenceGlyphSet, (13) SProcRenderFreeGlyphSet, (14) SProcRenderFreeGlyphs, or (15) SProcRenderCompositeGlyphs function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8101</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101" source="CVE"/>
    <description>
    The RandR extension in XFree86 4.2.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcRRQueryVersion, (2) SProcRRGetScreenInfo, (3) SProcRRSelectInput, or (4) SProcRRConfigureOutputProperty function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8102</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102" source="CVE"/>
    <description>
    The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8103</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103" source="CVE"/>
    <description>
    X.Org Server (aka xserver and xorg-server) 1.15.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) sproc_dri3_query_version, (2) sproc_dri3_open, (3) sproc_dri3_pixmap_from_buffer, (4) sproc_dri3_buffer_from_pixmap, (5) sproc_dri3_fence_from_fd, (6) sproc_dri3_fd_from_fence, (7) proc_present_query_capabilities, (8) sproc_present_query_version, (9) sproc_present_pixmap, (10) sproc_present_notify_msc, (11) sproc_present_select_input, or (12) sproc_present_query_capabilities function in the (a) DRI3 or (b) Present extension.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8104</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104" source="CVE"/>
    <description>
    OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102585" comment="openvpn-2.2.2-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102586" comment="openvpn-auth-pam-plugin-2.2.2-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102587" comment="openvpn-down-root-plugin-2.2.2-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8108</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8108" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103245" comment="libsvn_auth_gnome_keyring-1-0-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103246" comment="libsvn_auth_kwallet-1-0-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103247" comment="subversion-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103248" comment="subversion-bash-completion-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103249" comment="subversion-devel-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103250" comment="subversion-perl-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103251" comment="subversion-python-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103252" comment="subversion-server-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103253" comment="subversion-tools-1.7.19-2.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8109</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109" source="CVE"/>
    <description>
    mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103254" comment="apache2-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103255" comment="apache2-devel-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103256" comment="apache2-doc-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103257" comment="apache2-event-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103258" comment="apache2-example-pages-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103259" comment="apache2-itk-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103260" comment="apache2-prefork-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103261" comment="apache2-utils-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103262" comment="apache2-worker-2.2.29-10.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8118</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118" source="CVE"/>
    <description>
    Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103204" comment="python3-rpm-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103205" comment="rpm-python-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103206" comment="rpm-32bit-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103207" comment="rpm-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103208" comment="rpm-build-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103209" comment="rpm-devel-4.10.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8132</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132" source="CVE"/>
    <description>
    Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105046" comment="libssh-0.5.3-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105047" comment="libssh-devel-0.5.3-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105048" comment="libssh-devel-doc-0.5.3-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105049" comment="libssh4-0.5.3-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8133</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133" source="CVE"/>
    <description>
    arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8137</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137" source="CVE"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105095" comment="jasper-1.900.1-156.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105096" comment="libjasper-devel-1.900.1-156.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105097" comment="libjasper1-1.900.1-156.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105098" comment="libjasper1-32bit-1.900.1-156.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8326</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8326" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.5, 4.1.x before 4.1.14.6, and 4.2.x before 4.2.10.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) database name or (2) table name, related to the libraries/DatabaseInterface.class.php code for SQL debug output and the js/server_status_monitor.js code for the server monitor page.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101139" comment="phpMyAdmin-4.1.14.6-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8354</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101337" comment="ImageMagick-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101338" comment="ImageMagick-devel-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101339" comment="ImageMagick-devel-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101340" comment="ImageMagick-doc-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101341" comment="ImageMagick-extra-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101342" comment="libMagick++-devel-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101343" comment="libMagick++5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101344" comment="libMagickCore5-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101345" comment="libMagickCore5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101346" comment="libMagickWand5-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101347" comment="libMagickWand5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101348" comment="perl-PerlMagick-6.7.8.8-4.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8355</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101337" comment="ImageMagick-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101338" comment="ImageMagick-devel-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101339" comment="ImageMagick-devel-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101340" comment="ImageMagick-doc-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101341" comment="ImageMagick-extra-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101342" comment="libMagick++-devel-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101343" comment="libMagick++5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101344" comment="libMagickCore5-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101345" comment="libMagickCore5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101346" comment="libMagickWand5-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101347" comment="libMagickWand5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101348" comment="perl-PerlMagick-6.7.8.8-4.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8483</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8483" source="CVE"/>
    <description>
    The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101238" comment="quassel-0.8.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101239" comment="quassel-base-0.8.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101240" comment="quassel-client-0.8.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101241" comment="quassel-core-0.8.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101242" comment="quassel-mono-0.8.0-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8562</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101337" comment="ImageMagick-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101338" comment="ImageMagick-devel-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101339" comment="ImageMagick-devel-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101340" comment="ImageMagick-doc-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101341" comment="ImageMagick-extra-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101342" comment="libMagick++-devel-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101343" comment="libMagick++5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101344" comment="libMagickCore5-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101345" comment="libMagickCore5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101346" comment="libMagickWand5-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101347" comment="libMagickWand5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101348" comment="perl-PerlMagick-6.7.8.8-4.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8564</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8564" source="CVE"/>
    <description>
    The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101924" comment="gnutls-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101925" comment="libgnutls-devel-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101926" comment="libgnutls-devel-32bit-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101927" comment="libgnutls-openssl-devel-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101928" comment="libgnutls-openssl27-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101929" comment="libgnutls28-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101930" comment="libgnutls28-32bit-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101931" comment="libgnutlsxx-devel-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101932" comment="libgnutlsxx28-3.0.28-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8583</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8583" source="CVE"/>
    <description>
    mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102571" comment="apache2-mod_wsgi-3.3-12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8601</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8601" source="CVE"/>
    <description>
    PowerDNS Recursor before 3.6.2 does not limit delegation chaining, which allows remote attackers to cause a denial of service ("performance degradations") via a large or infinite number of referrals, as demonstrated by resolving domains hosted by ezdns.it.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103109" comment="pdns-recursor-3.6.2-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8709</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709" source="CVE"/>
    <description>
    The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8710</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710" source="CVE"/>
    <description>
    The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102084" comment="wireshark-1.10.11-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102085" comment="wireshark-devel-1.10.11-1.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8711</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711" source="CVE"/>
    <description>
    Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102084" comment="wireshark-1.10.11-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102085" comment="wireshark-devel-1.10.11-1.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8712</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712" source="CVE"/>
    <description>
    The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102084" comment="wireshark-1.10.11-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102085" comment="wireshark-devel-1.10.11-1.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8713</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713" source="CVE"/>
    <description>
    Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102084" comment="wireshark-1.10.11-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102085" comment="wireshark-devel-1.10.11-1.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8714</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714" source="CVE"/>
    <description>
    The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102084" comment="wireshark-1.10.11-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102085" comment="wireshark-devel-1.10.11-1.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8716</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102037" comment="ImageMagick-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102038" comment="ImageMagick-devel-32bit-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102039" comment="ImageMagick-devel-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102040" comment="ImageMagick-doc-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102041" comment="ImageMagick-extra-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102042" comment="libMagick++-devel-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102043" comment="libMagick++5-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102044" comment="libMagickCore5-32bit-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102045" comment="libMagickCore5-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102046" comment="libMagickWand5-32bit-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102047" comment="libMagickWand5-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102048" comment="perl-PerlMagick-6.7.8.8-4.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8884</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8958</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8958" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.6, 4.1.x before 4.1.14.7, and 4.2.x before 4.2.12 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) database, (2) table, or (3) column name that is improperly handled during rendering of the table browse page; a crafted ENUM value that is improperly handled during rendering of the (4) table print view or (5) zoom search page; or (6) a crafted pma_fontsize cookie that is improperly handled during rendering of the home page.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102495" comment="phpMyAdmin-4.1.14.7-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8959</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8959" source="CVE"/>
    <description>
    Directory traversal vulnerability in libraries/gis/GIS_Factory.class.php in the GIS editor in phpMyAdmin 4.0.x before 4.0.10.6, 4.1.x before 4.1.14.7, and 4.2.x before 4.2.12 allows remote authenticated users to include and execute arbitrary local files via a crafted geometry-type parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102495" comment="phpMyAdmin-4.1.14.7-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8960</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8960" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in libraries/error_report.lib.php in the error-reporting feature in phpMyAdmin 4.1.x before 4.1.14.7 and 4.2.x before 4.2.12 allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102495" comment="phpMyAdmin-4.1.14.7-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8961</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8961" source="CVE"/>
    <description>
    Directory traversal vulnerability in libraries/error_report.lib.php in the error-reporting feature in phpMyAdmin 4.1.x before 4.1.14.7 and 4.2.x before 4.2.12 allows remote authenticated users to obtain potentially sensitive information about a file's line count via a crafted parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102495" comment="phpMyAdmin-4.1.14.7-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8962</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-8962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962" source="CVE"/>
    <description>
    Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102573" comment="flac-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102574" comment="flac-devel-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102575" comment="flac-devel-32bit-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102576" comment="libFLAC++6-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102577" comment="libFLAC++6-32bit-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102578" comment="libFLAC8-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102579" comment="libFLAC8-32bit-1.2.1_git201212051942-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9018</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9018" source="CVE"/>
    <description>
    Icecast before 2.4.1 transmits the output of the on-connect script, which might allow remote attackers to obtain sensitive information, related to shared file descriptors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102572" comment="icecast-2.3.2-72.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9028</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028" source="CVE"/>
    <description>
    Heap-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102573" comment="flac-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102574" comment="flac-devel-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102575" comment="flac-devel-32bit-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102576" comment="libFLAC++6-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102577" comment="libFLAC++6-32bit-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102578" comment="libFLAC8-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102579" comment="libFLAC8-32bit-1.2.1_git201212051942-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9029</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029" source="CVE"/>
    <description>
    Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102774" comment="jasper-1.900.1-156.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102775" comment="libjasper-devel-1.900.1-156.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102776" comment="libjasper1-1.900.1-156.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102777" comment="libjasper1-32bit-1.900.1-156.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9050</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9050" source="CVE"/>
    <description>
    Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102494" comment="clamav-0.98.5-5.30.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9087</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087" source="CVE"/>
    <description>
    Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103110" comment="libksba-1.3.0-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103111" comment="libksba-devel-1.3.0-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103112" comment="libksba8-1.3.0-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9090</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090" source="CVE"/>
    <description>
    The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9091</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9091" source="CVE"/>
    <description>
    Icecast before 2.4.0 does not change the supplementary group privileges when &lt;changeowner&gt; is configured, which allows local users to gain privileges via unspecified vectors.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102572" comment="icecast-2.3.2-72.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9092</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9092" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102746" comment="libjpeg-turbo-1.2.1-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102747" comment="libjpeg8-32bit-8.0.2-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102748" comment="libjpeg8-8.0.2-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102749" comment="libjpeg8-devel-32bit-8.0.2-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102750" comment="libjpeg8-devel-8.0.2-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102751" comment="libjpeg62-32bit-62.0.0-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102752" comment="libjpeg62-62.0.0-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102753" comment="libjpeg62-devel-32bit-62.0.0-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102754" comment="libjpeg62-devel-62.0.0-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102755" comment="libjpeg62-turbo-1.2.1-19.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9112</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" source="CVE"/>
    <description>
    Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102737" comment="cpio-2.11-21.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102738" comment="cpio-lang-2.11-21.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9116</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116" source="CVE"/>
    <description>
    The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102762" comment="mutt-1.5.21-36.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9130</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130" source="CVE"/>
    <description>
    scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102700" comment="libyaml-0-2-0.1.3-11.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102701" comment="libyaml-0.1.3-11.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102702" comment="libyaml-devel-0.1.3-11.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9218</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9218" source="CVE"/>
    <description>
    libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.7, 4.1.x before 4.1.14.8, and 4.2.x before 4.2.13.1 allows remote attackers to cause a denial of service (resource consumption) via a long password.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102756" comment="phpMyAdmin-4.1.14.8-1.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9219</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9219" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the redirection feature in url.php in phpMyAdmin 4.2.x before 4.2.13.1 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102756" comment="phpMyAdmin-4.1.14.8-1.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9295</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102969" comment="ntp-4.2.6p5-9.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102970" comment="ntp-doc-4.2.6p5-9.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9296</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296" source="CVE"/>
    <description>
    The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102969" comment="ntp-4.2.6p5-9.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102970" comment="ntp-doc-4.2.6p5-9.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9322</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2014-9322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" source="CVE"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0235</title>
    <affected family="unix">
            <platform>openSUSE 12.3 Update</platform>
    </affected>
    <reference ref_id="CVE-2015-0235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" source="CVE"/>
    <description>
    Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
    </description>
 </metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105683" comment="glibc-testsuite-2.17-4.17.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105684" comment="glibc-utils-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105685" comment="glibc-utils-32bit-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105686" comment="glibc-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105687" comment="glibc-devel-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105688" comment="glibc-devel-static-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105689" comment="glibc-extra-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105690" comment="glibc-html-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105691" comment="glibc-i18ndata-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105692" comment="glibc-info-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105693" comment="glibc-locale-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105694" comment="glibc-obsolete-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105695" comment="glibc-profile-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105696" comment="nscd-2.17-4.17.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081493" version="1" comment="sudo is &lt;1.8.6p3-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081496" version="1" comment="sudo-devel is &lt;1.8.6p3-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081497" version="1" comment="firebird-classic is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081500" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081501" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081503" version="1" comment="firebird is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081504" version="1" comment="firebird-32bit is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081508" version="1" comment="firebird-devel is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081509" version="1" comment="firebird-doc is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081510" version="1" comment="firebird-superserver is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081512" version="1" comment="libfbclient2 is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081513" version="1" comment="libfbclient2-32bit is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081516" version="1" comment="libfbclient2-devel is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081517" version="1" comment="wireshark is &lt;1.8.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081520" version="1" comment="wireshark-devel is &lt;1.8.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081521" version="1" comment="MozillaFirefox is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081522" version="1" comment="MozillaFirefox-branding-upstream is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081523" version="1" comment="MozillaFirefox-buildsymbols is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081526" version="1" comment="MozillaFirefox-devel is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081527" version="1" comment="MozillaFirefox-translations-common is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081528" version="1" comment="MozillaFirefox-translations-other is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081529" version="1" comment="krb5-doc is &lt;1.10.2-10.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081530" version="1" comment="krb5-mini is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081533" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081534" version="1" comment="krb5 is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081535" version="1" comment="krb5-32bit is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081536" version="1" comment="krb5-client is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081541" version="1" comment="krb5-devel is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081542" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081543" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081545" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081547" version="1" comment="krb5-server is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081549" version="1" comment="mozilla-js is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081550" version="1" comment="mozilla-js-32bit is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081553" version="1" comment="xulrunner is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081554" version="1" comment="xulrunner-32bit is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081555" version="1" comment="xulrunner-buildsymbols is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081559" version="1" comment="xulrunner-devel is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081561" version="1" comment="PackageKit is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081562" version="1" comment="PackageKit-backend-zypp is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081564" version="1" comment="PackageKit-branding-upstream is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081565" version="1" comment="PackageKit-browser-plugin is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081569" version="1" comment="PackageKit-devel is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081571" version="1" comment="PackageKit-gstreamer-plugin is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081573" version="1" comment="PackageKit-gtk3-module is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081575" version="1" comment="PackageKit-lang is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081576" version="1" comment="libpackagekit-glib2-16 is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081577" version="1" comment="libpackagekit-glib2-16-32bit is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081580" version="1" comment="libpackagekit-glib2-devel is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081581" version="1" comment="libpackagekit-glib2-devel-32bit is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081582" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081583" version="1" comment="typelib-1_0-PackageKitPlugin-1_0 is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081584" version="1" comment="seamonkey is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081587" version="1" comment="seamonkey-dom-inspector is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081588" version="1" comment="seamonkey-irc is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081589" version="1" comment="seamonkey-translations-common is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081590" version="1" comment="seamonkey-translations-other is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081591" version="1" comment="seamonkey-venkman is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081592" version="1" comment="perl-32bit is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081593" version="1" comment="perl is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081594" version="1" comment="perl-base-32bit is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081595" version="1" comment="perl-base is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081601" version="1" comment="perl-doc is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081602" version="1" comment="finch is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081604" version="1" comment="finch-devel is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081605" version="1" comment="libpurple is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081606" version="1" comment="libpurple-branding-upstream is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081608" version="1" comment="libpurple-devel is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081609" version="1" comment="libpurple-lang is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081610" version="1" comment="libpurple-meanwhile is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081612" version="1" comment="libpurple-tcl is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081614" version="1" comment="pidgin is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081617" version="1" comment="pidgin-devel is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081618" version="1" comment="openstack-cinder-doc is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081619" version="1" comment="openstack-cinder is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081620" version="1" comment="openstack-cinder-api is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081621" version="1" comment="openstack-cinder-scheduler is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081622" version="1" comment="openstack-cinder-test is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081623" version="1" comment="openstack-cinder-volume is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081624" version="1" comment="python-cinder is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081625" version="1" comment="openstack-dashboard is &lt;2012.2.4+git.1362503968.8ece3c7-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081626" version="1" comment="openstack-dashboard-test is &lt;2012.2.4+git.1362503968.8ece3c7-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081627" version="1" comment="python-horizon is &lt;2012.2.4+git.1362503968.8ece3c7-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081628" version="1" comment="openstack-glance-doc is &lt;2012.2.4+git.1363297737.dd849a9-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081629" version="1" comment="openstack-glance is &lt;2012.2.4+git.1363297737.dd849a9-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081630" version="1" comment="openstack-glance-test is &lt;2012.2.4+git.1363297737.dd849a9-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081631" version="1" comment="python-glance is &lt;2012.2.4+git.1363297737.dd849a9-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081632" version="1" comment="openstack-keystone-doc is &lt;2012.2.4+git.1362502288.8690166-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081633" version="1" comment="openstack-keystone is &lt;2012.2.4+git.1362502288.8690166-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081634" version="1" comment="openstack-keystone-test is &lt;2012.2.4+git.1362502288.8690166-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081635" version="1" comment="python-keystone is &lt;2012.2.4+git.1362502288.8690166-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081636" version="1" comment="openstack-nova-doc is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081637" version="1" comment="openstack-nova is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081638" version="1" comment="openstack-nova-api is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081639" version="1" comment="openstack-nova-cert is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081640" version="1" comment="openstack-nova-compute is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081641" version="1" comment="openstack-nova-network is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081642" version="1" comment="openstack-nova-novncproxy is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081643" version="1" comment="openstack-nova-objectstore is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081644" version="1" comment="openstack-nova-scheduler is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081645" version="1" comment="openstack-nova-test is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081646" version="1" comment="openstack-nova-vncproxy is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081647" version="1" comment="openstack-nova-volume is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081648" version="1" comment="python-nova is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081649" version="1" comment="openstack-quantum is &lt;2012.2.4+git.1362583635.f94b149-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081650" version="1" comment="openstack-quantum-doc is &lt;2012.2.4+git.1362583635.f94b149-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081651" version="1" comment="openstack-quantum-test is &lt;2012.2.4+git.1362583635.f94b149-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081652" version="1" comment="python-quantum is &lt;2012.2.4+git.1362583635.f94b149-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081653" version="1" comment="openstack-quickstart is &lt;2012.2+git.1360262230.cb0fbe8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081654" version="1" comment="openstack-swift-doc is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081655" version="1" comment="openstack-swift is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081656" version="1" comment="openstack-swift-account is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081657" version="1" comment="openstack-swift-container is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081658" version="1" comment="openstack-swift-object is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081659" version="1" comment="openstack-swift-proxy is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081660" version="1" comment="openstack-swift-test is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081661" version="1" comment="python-swift is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081662" version="1" comment="python-cinderclient is &lt;1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081663" version="1" comment="python-cinderclient-doc is &lt;1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081664" version="1" comment="python-cinderclient-test is &lt;1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081665" version="1" comment="python-django_openstack_auth is &lt;1.0.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081666" version="1" comment="python-keystoneclient is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081667" version="1" comment="python-keystoneclient-doc is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081668" version="1" comment="python-keystoneclient-test is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081669" version="1" comment="MozillaThunderbird is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081670" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081673" version="1" comment="MozillaThunderbird-devel is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081675" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081676" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081677" version="1" comment="enigmail is &lt;1.5.1+17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081679" version="1" comment="typo3-cms-4_5 is &lt;4.5.25-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081680" version="1" comment="typo3-cms-4_6 is &lt;4.6.18-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081681" version="1" comment="typo3-cms-4_7 is &lt;4.7.10-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081682" version="1" comment="nss-pam-ldapd is &lt;0.8.10-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081683" version="1" comment="nss-pam-ldapd-32bit is &lt;0.8.10-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081687" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081690" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081692" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081694" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081695" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081696" version="1" comment="telepathy-gabble is &lt;0.17.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081699" version="1" comment="telepathy-gabble-xmpp-console is &lt;0.17.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081701" version="1" comment="libxml2-2 is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081702" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081705" version="1" comment="libxml2 is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081707" version="1" comment="libxml2-devel is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081708" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081709" version="1" comment="libxml2-doc is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081710" version="1" comment="libxml2-tools is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081712" version="1" comment="python-libxml2 is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081715" version="1" comment="almanah is &lt;0.10.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081718" version="1" comment="almanah-lang is &lt;0.10.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079318" version="1" comment="privoxy is &lt;3.0.21-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079321" version="1" comment="privoxy-doc is &lt;3.0.21-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081719" version="1" comment="ImageMagick is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081722" version="1" comment="ImageMagick-devel-32bit is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081723" version="1" comment="ImageMagick-devel is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081724" version="1" comment="ImageMagick-doc is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081725" version="1" comment="ImageMagick-extra is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081727" version="1" comment="libMagick++-devel is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081728" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081730" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081731" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081734" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081735" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081738" version="1" comment="perl-PerlMagick is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081740" version="1" comment="GraphicsMagick is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081743" version="1" comment="GraphicsMagick-devel is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081744" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081745" version="1" comment="libGraphicsMagick++3 is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081747" version="1" comment="libGraphicsMagick3 is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081749" version="1" comment="libGraphicsMagickWand2 is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081751" version="1" comment="perl-GraphicsMagick is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081753" version="1" comment="pigz is &lt;2.2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081756" version="1" comment="libipa_hbac-devel is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081757" version="1" comment="libipa_hbac0 is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081759" version="1" comment="libsss_idmap-devel is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081760" version="1" comment="libsss_idmap0 is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081762" version="1" comment="libsss_sudo is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081764" version="1" comment="python-ipa_hbac is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081766" version="1" comment="python-sssd-config is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081768" version="1" comment="sssd is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081769" version="1" comment="sssd-32bit is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081773" version="1" comment="sssd-ipa-provider is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081775" version="1" comment="sssd-tools is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081777" version="1" comment="clamav is &lt;0.97.7-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081780" version="1" comment="openstack-keystone-doc is &lt;2012.2.4+git.1363796849.255b1d4-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081781" version="1" comment="openstack-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081782" version="1" comment="openstack-keystone-test is &lt;2012.2.4+git.1363796849.255b1d4-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081783" version="1" comment="python-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081784" version="1" comment="ruby is &lt;1.9.3-15.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081785" version="1" comment="ruby-devel is &lt;1.9.3-15.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081786" version="1" comment="ruby19 is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081789" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081790" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081791" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081792" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081794" version="1" comment="fail2ban is &lt;0.8.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081795" version="1" comment="libxslt-python is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081798" version="1" comment="libxslt is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081800" version="1" comment="libxslt-devel is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081801" version="1" comment="libxslt-devel-32bit is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081802" version="1" comment="libxslt-tools is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081804" version="1" comment="libxslt1 is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081805" version="1" comment="libxslt1-32bit is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081808" version="1" comment="puppet is &lt;3.0.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081809" version="1" comment="puppet-server is &lt;3.0.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081810" version="1" comment="bind is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081811" version="1" comment="bind-chrootenv is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081814" version="1" comment="bind-devel is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081815" version="1" comment="bind-doc is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081816" version="1" comment="bind-libs-32bit is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081817" version="1" comment="bind-libs is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081820" version="1" comment="bind-lwresd is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081822" version="1" comment="bind-utils is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081824" version="1" comment="dhcp is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081825" version="1" comment="dhcp-client is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081829" version="1" comment="dhcp-devel is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081830" version="1" comment="dhcp-doc is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081831" version="1" comment="dhcp-relay is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081833" version="1" comment="dhcp-server is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081835" version="1" comment="jakarta-commons-httpclient is &lt;3.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081836" version="1" comment="jakarta-commons-httpclient-demo is &lt;3.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081837" version="1" comment="jakarta-commons-httpclient-javadoc is &lt;3.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081838" version="1" comment="jakarta-commons-httpclient-manual is &lt;3.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081839" version="1" comment="apache2 is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081842" version="1" comment="apache2-devel is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081843" version="1" comment="apache2-doc is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081844" version="1" comment="apache2-event is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081846" version="1" comment="apache2-example-pages is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081847" version="1" comment="apache2-itk is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081849" version="1" comment="apache2-prefork is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081851" version="1" comment="apache2-utils is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081853" version="1" comment="apache2-worker is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081855" version="1" comment="roundcubemail is &lt;0.8.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081856" version="1" comment="MozillaFirefox is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081857" version="1" comment="MozillaFirefox-branding-upstream is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081858" version="1" comment="MozillaFirefox-buildsymbols is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081861" version="1" comment="MozillaFirefox-devel is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081862" version="1" comment="MozillaFirefox-translations-common is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081863" version="1" comment="MozillaFirefox-translations-other is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081864" version="1" comment="MozillaThunderbird is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081865" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081868" version="1" comment="MozillaThunderbird-devel is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081870" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081871" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081872" version="1" comment="enigmail is &lt;1.5.1+17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081874" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081875" version="1" comment="mozilla-nspr is &lt;4.9.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081879" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081880" version="1" comment="libfreebl3 is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081881" version="1" comment="libfreebl3-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081884" version="1" comment="libsoftokn3 is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081885" version="1" comment="libsoftokn3-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081888" version="1" comment="mozilla-nss is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081889" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081890" version="1" comment="mozilla-nss-certs is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081891" version="1" comment="mozilla-nss-certs-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081897" version="1" comment="mozilla-nss-devel is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081898" version="1" comment="mozilla-nss-sysinit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081899" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081902" version="1" comment="mozilla-nss-tools is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081904" version="1" comment="mozilla-js is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081905" version="1" comment="mozilla-js-32bit is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081908" version="1" comment="xulrunner is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081909" version="1" comment="xulrunner-32bit is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081910" version="1" comment="xulrunner-buildsymbols is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081914" version="1" comment="xulrunner-devel is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081916" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081917" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081918" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081919" version="1" comment="rubygem-activerecord-3_2-doc is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081920" version="1" comment="libecpg6-32bit is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081921" version="1" comment="libecpg6 is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081924" version="1" comment="libpq5-32bit is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081925" version="1" comment="libpq5 is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081928" version="1" comment="postgresql92-devel is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081930" version="1" comment="postgresql92-libs is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081932" version="1" comment="postgresql92 is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081933" version="1" comment="postgresql92-contrib is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081937" version="1" comment="postgresql92-docs is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081938" version="1" comment="postgresql92-plperl is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081940" version="1" comment="postgresql92-plpython is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081942" version="1" comment="postgresql92-pltcl is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081944" version="1" comment="postgresql92-server is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081946" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081948" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081950" version="1" comment="subversion is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081951" version="1" comment="subversion-bash-completion is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081954" version="1" comment="subversion-devel is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081955" version="1" comment="subversion-perl is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081957" version="1" comment="subversion-python is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081959" version="1" comment="subversion-server is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081961" version="1" comment="subversion-tools is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081963" version="1" comment="seamonkey is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081966" version="1" comment="seamonkey-dom-inspector is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081967" version="1" comment="seamonkey-irc is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081968" version="1" comment="seamonkey-translations-common is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081969" version="1" comment="seamonkey-translations-other is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081970" version="1" comment="seamonkey-venkman is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081971" version="1" comment="curl is &lt;7.28.1-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081974" version="1" comment="libcurl-devel is &lt;7.28.1-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081975" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081976" version="1" comment="libcurl4 is &lt;7.28.1-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081979" version="1" comment="Mesa-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081980" version="1" comment="Mesa is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081984" version="1" comment="Mesa-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081985" version="1" comment="Mesa-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081986" version="1" comment="Mesa-libEGL-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081987" version="1" comment="Mesa-libEGL-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081988" version="1" comment="Mesa-libEGL1-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081989" version="1" comment="Mesa-libEGL1 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081992" version="1" comment="Mesa-libGL-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081993" version="1" comment="Mesa-libGL-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081994" version="1" comment="Mesa-libGL1-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081995" version="1" comment="Mesa-libGL1 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081998" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081999" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082000" version="1" comment="Mesa-libGLESv1_CM1-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082001" version="1" comment="Mesa-libGLESv1_CM1 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082004" version="1" comment="Mesa-libGLESv2-2-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082005" version="1" comment="Mesa-libGLESv2-2 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082008" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082009" version="1" comment="Mesa-libGLESv2-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082010" version="1" comment="Mesa-libIndirectGL-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082011" version="1" comment="Mesa-libIndirectGL-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082012" version="1" comment="Mesa-libIndirectGL1-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082013" version="1" comment="Mesa-libIndirectGL1 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082016" version="1" comment="Mesa-libglapi-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082017" version="1" comment="Mesa-libglapi-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082018" version="1" comment="Mesa-libglapi0-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082019" version="1" comment="Mesa-libglapi0 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082022" version="1" comment="libOSMesa-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082023" version="1" comment="libOSMesa-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082024" version="1" comment="libOSMesa9-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082025" version="1" comment="libOSMesa9 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082028" version="1" comment="libXvMC_nouveau-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082029" version="1" comment="libXvMC_nouveau is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082032" version="1" comment="libXvMC_r300-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082033" version="1" comment="libXvMC_r300 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082036" version="1" comment="libXvMC_r600-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082037" version="1" comment="libXvMC_r600 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082040" version="1" comment="libXvMC_softpipe-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082041" version="1" comment="libXvMC_softpipe is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082044" version="1" comment="libgbm-devel is &lt;0.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082045" version="1" comment="libgbm-devel-32bit is &lt;0.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082046" version="1" comment="libgbm1 is &lt;0.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082047" version="1" comment="libgbm1-32bit is &lt;0.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082050" version="1" comment="libvdpau_nouveau-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082051" version="1" comment="libvdpau_nouveau is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082054" version="1" comment="libvdpau_r300-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082055" version="1" comment="libvdpau_r300 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082058" version="1" comment="libvdpau_r600-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082059" version="1" comment="libvdpau_r600 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082062" version="1" comment="libvdpau_softpipe-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082063" version="1" comment="libvdpau_softpipe is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082066" version="1" comment="libxatracker-devel is &lt;1.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082067" version="1" comment="libxatracker1 is &lt;1.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082069" version="1" comment="icedtea-web is &lt;1.3.2-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082072" version="1" comment="icedtea-web-javadoc is &lt;1.3.2-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082073" version="1" comment="kernel-debug is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082074" version="1" comment="kernel-debug-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082078" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082080" version="1" comment="kernel-default is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082081" version="1" comment="kernel-default-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082085" version="1" comment="kernel-default-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082087" version="1" comment="kernel-desktop is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082088" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082092" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082094" version="1" comment="kernel-docs is &lt;3.7.10-1.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082095" version="1" comment="kernel-ec2 is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082096" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082100" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082102" version="1" comment="kernel-pae is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082103" version="1" comment="kernel-pae-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082107" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082109" version="1" comment="kernel-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082110" version="1" comment="kernel-source is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082111" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082112" version="1" comment="kernel-syms is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082113" version="1" comment="kernel-trace is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082114" version="1" comment="kernel-trace-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082118" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082120" version="1" comment="kernel-vanilla is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082123" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082125" version="1" comment="kernel-xen is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082126" version="1" comment="kernel-xen-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082130" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082132" version="1" comment="libxml2-2 is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082133" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082136" version="1" comment="libxml2 is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082138" version="1" comment="libxml2-devel is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082139" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082140" version="1" comment="libxml2-doc is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082141" version="1" comment="libxml2-tools is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082143" version="1" comment="python-libxml2 is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082146" version="1" comment="krb5-doc is &lt;1.10.2-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082147" version="1" comment="krb5-mini is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082150" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082151" version="1" comment="krb5 is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082152" version="1" comment="krb5-32bit is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082153" version="1" comment="krb5-client is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082158" version="1" comment="krb5-devel is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082159" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082160" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082162" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082164" version="1" comment="krb5-server is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082166" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082169" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082171" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082173" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082174" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082175" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082178" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082180" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082181" version="1" comment="strongswan is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082183" version="1" comment="strongswan-doc is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082184" version="1" comment="strongswan-ipsec is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082186" version="1" comment="strongswan-libs0 is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082188" version="1" comment="strongswan-mysql is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082190" version="1" comment="strongswan-nm is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082192" version="1" comment="strongswan-sqlite is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082194" version="1" comment="python-httplib2 is &lt;0.7.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082195" version="1" comment="telepathy-idle is &lt;0.1.14-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082198" version="1" comment="openconnect is &lt;4.08-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082201" version="1" comment="openconnect-devel is &lt;4.08-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082202" version="1" comment="openconnect-doc is &lt;4.08-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082203" version="1" comment="openconnect-lang is &lt;4.08-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082204" version="1" comment="icedtea-web is &lt;1.4-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082207" version="1" comment="icedtea-web-javadoc is &lt;1.4-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082208" version="1" comment="clamav is &lt;0.97.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082211" version="1" comment="libtiff-devel-32bit is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082212" version="1" comment="libtiff-devel is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082213" version="1" comment="libtiff5-32bit is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082214" version="1" comment="libtiff5 is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082217" version="1" comment="tiff is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082220" version="1" comment="openstack-keystone-doc is &lt;2012.2.4+git.1363796849.255b1d4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082221" version="1" comment="openstack-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082222" version="1" comment="openstack-keystone-test is &lt;2012.2.4+git.1363796849.255b1d4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082223" version="1" comment="python-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082224" version="1" comment="samba-doc is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082225" version="1" comment="ldapsmb is &lt;1.34b-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082226" version="1" comment="libnetapi-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082227" version="1" comment="libnetapi0 is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082229" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082230" version="1" comment="libsmbclient0 is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082231" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082234" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082235" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082237" version="1" comment="libwbclient-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082238" version="1" comment="libwbclient0 is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082239" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082242" version="1" comment="samba is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082243" version="1" comment="samba-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082244" version="1" comment="samba-client is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082245" version="1" comment="samba-client-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082251" version="1" comment="samba-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082252" version="1" comment="samba-krb-printing is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082254" version="1" comment="samba-winbind is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082255" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082258" version="1" comment="MozillaFirefox-branding-openSUSE is &lt;21-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082259" version="1" comment="MozillaFirefox is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082260" version="1" comment="MozillaFirefox-branding-upstream is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082261" version="1" comment="MozillaFirefox-buildsymbols is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082264" version="1" comment="MozillaFirefox-devel is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082265" version="1" comment="MozillaFirefox-translations-common is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082266" version="1" comment="MozillaFirefox-translations-other is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082267" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082268" version="1" comment="mozilla-nspr is &lt;4.9.6-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082272" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082273" version="1" comment="MozillaThunderbird is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082274" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082277" version="1" comment="MozillaThunderbird-devel is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082279" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082280" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082281" version="1" comment="enigmail is &lt;1.5.1+17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082283" version="1" comment="mozilla-js is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082284" version="1" comment="mozilla-js-32bit is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082287" version="1" comment="xulrunner is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082288" version="1" comment="xulrunner-32bit is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082289" version="1" comment="xulrunner-buildsymbols is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082293" version="1" comment="xulrunner-devel is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082295" version="1" comment="kernel-debug is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082296" version="1" comment="kernel-debug-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082300" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082302" version="1" comment="kernel-default is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082303" version="1" comment="kernel-default-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082307" version="1" comment="kernel-default-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082309" version="1" comment="kernel-desktop is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082310" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082314" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082316" version="1" comment="kernel-docs is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082317" version="1" comment="kernel-ec2 is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082318" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082322" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082324" version="1" comment="kernel-pae is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082325" version="1" comment="kernel-pae-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082329" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082331" version="1" comment="kernel-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082332" version="1" comment="kernel-source is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082333" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082334" version="1" comment="kernel-syms is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082335" version="1" comment="kernel-trace is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082336" version="1" comment="kernel-trace-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082340" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082342" version="1" comment="kernel-vanilla is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082345" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082347" version="1" comment="kernel-xen is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082348" version="1" comment="kernel-xen-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082352" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082354" version="1" comment="gpg2 is &lt;2.0.19-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082357" version="1" comment="gpg2-lang is &lt;2.0.19-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082358" version="1" comment="libvirt is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082359" version="1" comment="libvirt-client is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082360" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082365" version="1" comment="libvirt-devel is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082366" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082367" version="1" comment="libvirt-doc is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082368" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082370" version="1" comment="libvirt-python is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082372" version="1" comment="wireshark is &lt;1.8.7-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082375" version="1" comment="wireshark-devel is &lt;1.8.7-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082376" version="1" comment="nginx is &lt;1.2.9-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082379" version="1" comment="libxcb is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082380" version="1" comment="libxcb-composite0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082381" version="1" comment="libxcb-composite0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082384" version="1" comment="libxcb-damage0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082385" version="1" comment="libxcb-damage0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082389" version="1" comment="libxcb-devel is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082390" version="1" comment="libxcb-devel-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082391" version="1" comment="libxcb-dpms0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082392" version="1" comment="libxcb-dpms0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082395" version="1" comment="libxcb-dri2-0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082396" version="1" comment="libxcb-dri2-0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082399" version="1" comment="libxcb-glx0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082400" version="1" comment="libxcb-glx0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082403" version="1" comment="libxcb-randr0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082404" version="1" comment="libxcb-randr0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082407" version="1" comment="libxcb-record0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082408" version="1" comment="libxcb-record0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082411" version="1" comment="libxcb-render0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082412" version="1" comment="libxcb-render0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082415" version="1" comment="libxcb-res0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082416" version="1" comment="libxcb-res0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082419" version="1" comment="libxcb-screensaver0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082420" version="1" comment="libxcb-screensaver0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082423" version="1" comment="libxcb-shape0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082424" version="1" comment="libxcb-shape0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082427" version="1" comment="libxcb-shm0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082428" version="1" comment="libxcb-shm0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082431" version="1" comment="libxcb-sync0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082432" version="1" comment="libxcb-sync0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082435" version="1" comment="libxcb-xevie0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082436" version="1" comment="libxcb-xevie0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082439" version="1" comment="libxcb-xf86dri0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082440" version="1" comment="libxcb-xf86dri0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082443" version="1" comment="libxcb-xfixes0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082444" version="1" comment="libxcb-xfixes0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082447" version="1" comment="libxcb-xinerama0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082448" version="1" comment="libxcb-xinerama0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082451" version="1" comment="libxcb-xprint0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082452" version="1" comment="libxcb-xprint0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082455" version="1" comment="libxcb-xtest0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082456" version="1" comment="libxcb-xtest0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082459" version="1" comment="libxcb-xv0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082460" version="1" comment="libxcb-xv0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082463" version="1" comment="libxcb-xvmc0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082464" version="1" comment="libxcb-xvmc0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082467" version="1" comment="libxcb1 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082468" version="1" comment="libxcb1-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082471" version="1" comment="libXext is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082473" version="1" comment="libXext-devel is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082474" version="1" comment="libXext-devel-32bit is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082475" version="1" comment="libXext6 is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082476" version="1" comment="libXext6-32bit is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082479" version="1" comment="libXfixes is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082481" version="1" comment="libXfixes-devel-32bit is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082482" version="1" comment="libXfixes-devel is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082483" version="1" comment="libXfixes3-32bit is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082484" version="1" comment="libXfixes3 is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082487" version="1" comment="libXp is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082489" version="1" comment="libXp-devel is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082490" version="1" comment="libXp-devel-32bit is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082491" version="1" comment="libXp6 is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082492" version="1" comment="libXp6-32bit is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082495" version="1" comment="libXrender is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082497" version="1" comment="libXrender-devel is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082498" version="1" comment="libXrender-devel-32bit is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082499" version="1" comment="libXrender1 is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082500" version="1" comment="libXrender1-32bit is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082503" version="1" comment="libXt is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082505" version="1" comment="libXt-devel is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082506" version="1" comment="libXt-devel-32bit is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082507" version="1" comment="libXt6 is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082508" version="1" comment="libXt6-32bit is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082511" version="1" comment="libXv is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082513" version="1" comment="libXv-devel is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082514" version="1" comment="libXv-devel-32bit is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082515" version="1" comment="libXv1 is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082516" version="1" comment="libXv1-32bit is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082519" version="1" comment="telepathy-gabble is &lt;0.17.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082522" version="1" comment="telepathy-gabble-xmpp-console is &lt;0.17.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082524" version="1" comment="nfs-client is &lt;1.2.7-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082526" version="1" comment="nfs-doc is &lt;1.2.7-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082527" version="1" comment="nfs-kernel-server is &lt;1.2.7-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082529" version="1" comment="nfs-utils is &lt;1.2.7-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082531" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082533" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082535" version="1" comment="subversion is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082536" version="1" comment="subversion-bash-completion is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082539" version="1" comment="subversion-devel is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082540" version="1" comment="subversion-perl is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082542" version="1" comment="subversion-python is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082544" version="1" comment="subversion-server is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082546" version="1" comment="subversion-tools is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082548" version="1" comment="autotrace is &lt;0.31.1-637.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082551" version="1" comment="autotrace-devel is &lt;0.31.1-637.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082552" version="1" comment="libautotrace3 is &lt;0.31.1-637.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082554" version="1" comment="python-pymongo is &lt;2.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082557" version="1" comment="python3-pymongo is &lt;2.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082560" version="1" comment="kernel-debug is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082561" version="1" comment="kernel-debug-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082565" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082567" version="1" comment="kernel-default is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082568" version="1" comment="kernel-default-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082572" version="1" comment="kernel-default-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082574" version="1" comment="kernel-desktop is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082575" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082579" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082581" version="1" comment="kernel-docs is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082582" version="1" comment="kernel-ec2 is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082583" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082587" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082589" version="1" comment="kernel-pae is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082590" version="1" comment="kernel-pae-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082594" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082596" version="1" comment="kernel-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082597" version="1" comment="kernel-source is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082598" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082599" version="1" comment="kernel-syms is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082600" version="1" comment="kernel-trace is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082601" version="1" comment="kernel-trace-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082605" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082607" version="1" comment="kernel-vanilla is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082610" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082612" version="1" comment="kernel-xen is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082613" version="1" comment="kernel-xen-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082617" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082619" version="1" comment="libFS is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082621" version="1" comment="libFS-devel is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082622" version="1" comment="libFS-devel-32bit is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082623" version="1" comment="libFS6 is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082624" version="1" comment="libFS6-32bit is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082627" version="1" comment="libXcursor is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082629" version="1" comment="libXcursor-devel is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082630" version="1" comment="libXcursor-devel-32bit is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082631" version="1" comment="libXcursor1 is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082632" version="1" comment="libXcursor1-32bit is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082635" version="1" comment="libXi is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082637" version="1" comment="libXi-devel is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082638" version="1" comment="libXi-devel-32bit is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082639" version="1" comment="libXi6 is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082640" version="1" comment="libXi6-32bit is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082643" version="1" comment="libXinerama is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082645" version="1" comment="libXinerama-devel is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082646" version="1" comment="libXinerama-devel-32bit is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082647" version="1" comment="libXinerama1 is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082648" version="1" comment="libXinerama1-32bit is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082651" version="1" comment="libXrandr is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082653" version="1" comment="libXrandr-devel is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082654" version="1" comment="libXrandr-devel-32bit is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082655" version="1" comment="libXrandr2 is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082656" version="1" comment="libXrandr2-32bit is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082659" version="1" comment="libXRes1 is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082660" version="1" comment="libXRes1-32bit is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082663" version="1" comment="libXres is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082665" version="1" comment="libXres-devel is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082666" version="1" comment="libXres-devel-32bit is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082667" version="1" comment="libXtst is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082669" version="1" comment="libXtst-devel is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082670" version="1" comment="libXtst-devel-32bit is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082671" version="1" comment="libXtst6 is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082672" version="1" comment="libXtst6-32bit is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082675" version="1" comment="libXvMC is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082677" version="1" comment="libXvMC-devel is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082678" version="1" comment="libXvMC-devel-32bit is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082679" version="1" comment="libXvMC1 is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082680" version="1" comment="libXvMC1-32bit is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082683" version="1" comment="libXxf86dga is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082685" version="1" comment="libXxf86dga-devel is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082686" version="1" comment="libXxf86dga-devel-32bit is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082687" version="1" comment="libXxf86dga1 is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082688" version="1" comment="libXxf86dga1-32bit is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082691" version="1" comment="libXxf86vm is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082693" version="1" comment="libXxf86vm-devel is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082694" version="1" comment="libXxf86vm-devel-32bit is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082695" version="1" comment="libXxf86vm1 is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082696" version="1" comment="libXxf86vm1-32bit is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082699" version="1" comment="libdmx is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082701" version="1" comment="libdmx-devel is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082702" version="1" comment="libdmx-devel-32bit is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082703" version="1" comment="libdmx1 is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082704" version="1" comment="libdmx1-32bit is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082707" version="1" comment="libX11 is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082708" version="1" comment="libX11-6 is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082709" version="1" comment="libX11-6-32bit is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082712" version="1" comment="libX11-data is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082714" version="1" comment="libX11-devel is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082715" version="1" comment="libX11-devel-32bit is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082716" version="1" comment="libX11-xcb1 is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082717" version="1" comment="libX11-xcb1-32bit is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082720" version="1" comment="darktable is &lt;1.1.3-1.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082723" version="1" comment="darktable-doc is &lt;1.1.3-1.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082724" version="1" comment="darktable is &lt;1.1.3-1.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082727" version="1" comment="darktable-doc is &lt;1.1.3-1.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082728" version="1" comment="wireshark is &lt;1.8.8-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082731" version="1" comment="wireshark-devel is &lt;1.8.8-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082732" version="1" comment="phpMyAdmin is &lt;3.5.8.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082733" version="1" comment="libraw is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082735" version="1" comment="libraw-devel is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082736" version="1" comment="libraw-devel-static is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082737" version="1" comment="libraw-tools is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082739" version="1" comment="libraw5 is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082741" version="1" comment="libraw is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082743" version="1" comment="libraw-devel is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082744" version="1" comment="libraw-devel-static is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082745" version="1" comment="libraw-tools is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082747" version="1" comment="libraw5 is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082749" version="1" comment="openstack-nova-doc is &lt;2012.2.4+git.1363297910.9561484-2.10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082750" version="1" comment="openstack-nova is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082751" version="1" comment="openstack-nova-api is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082752" version="1" comment="openstack-nova-cert is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082753" version="1" comment="openstack-nova-compute is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082754" version="1" comment="openstack-nova-network is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082755" version="1" comment="openstack-nova-novncproxy is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082756" version="1" comment="openstack-nova-objectstore is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082757" version="1" comment="openstack-nova-scheduler is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082758" version="1" comment="openstack-nova-test is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082759" version="1" comment="openstack-nova-vncproxy is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082760" version="1" comment="openstack-nova-volume is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082761" version="1" comment="python-nova is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082762" version="1" comment="python-greenlet is &lt;0.4.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082765" version="1" comment="python-greenlet-devel is &lt;0.4.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082766" version="1" comment="openstack-swift-doc is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082767" version="1" comment="openstack-swift is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082768" version="1" comment="openstack-swift-account is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082769" version="1" comment="openstack-swift-container is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082770" version="1" comment="openstack-swift-object is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082771" version="1" comment="openstack-swift-proxy is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082772" version="1" comment="openstack-swift-test is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082773" version="1" comment="python-swift is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082774" version="1" comment="openstack-keystone-doc is &lt;2012.2.4+git.1363796849.255b1d4-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082775" version="1" comment="openstack-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082776" version="1" comment="openstack-keystone-test is &lt;2012.2.4+git.1363796849.255b1d4-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082777" version="1" comment="python-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082778" version="1" comment="python-keystoneclient is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082779" version="1" comment="python-keystoneclient-doc is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082780" version="1" comment="python-keystoneclient-test is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082781" version="1" comment="fail2ban is &lt;0.8.8-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082782" version="1" comment="krb5-doc is &lt;1.10.2-10.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082783" version="1" comment="krb5-mini is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082786" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082787" version="1" comment="krb5 is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082788" version="1" comment="krb5-32bit is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082789" version="1" comment="krb5-client is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082794" version="1" comment="krb5-devel is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082795" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082796" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082798" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082800" version="1" comment="krb5-server is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082802" version="1" comment="dbus-1-x11 is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082805" version="1" comment="dbus-1 is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082806" version="1" comment="dbus-1-32bit is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082810" version="1" comment="dbus-1-devel is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082811" version="1" comment="dbus-1-devel-32bit is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082812" version="1" comment="dbus-1-devel-doc is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082813" version="1" comment="libdbus-1-3 is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082814" version="1" comment="libdbus-1-3-32bit is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082817" version="1" comment="xdm is &lt;1.1.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082820" version="1" comment="curl is &lt;7.28.1-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082823" version="1" comment="libcurl-devel is &lt;7.28.1-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082824" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082825" version="1" comment="libcurl4 is &lt;7.28.1-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082828" version="1" comment="MozillaFirefox is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082829" version="1" comment="MozillaFirefox-branding-upstream is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082830" version="1" comment="MozillaFirefox-buildsymbols is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082833" version="1" comment="MozillaFirefox-devel is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082834" version="1" comment="MozillaFirefox-translations-common is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082835" version="1" comment="MozillaFirefox-translations-other is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082836" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082837" version="1" comment="mozilla-nspr is &lt;4.9.6-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082841" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082842" version="1" comment="MozillaThunderbird is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082843" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082846" version="1" comment="MozillaThunderbird-devel is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082848" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082849" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082850" version="1" comment="enigmail is &lt;1.5.1+17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082852" version="1" comment="mozilla-js is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082853" version="1" comment="mozilla-js-32bit is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082856" version="1" comment="xulrunner is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082857" version="1" comment="xulrunner-32bit is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082858" version="1" comment="xulrunner-buildsymbols is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082862" version="1" comment="xulrunner-devel is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082864" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082867" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082869" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082870" version="1" comment="python-bugzilla is &lt;0.6.2-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082871" version="1" comment="nagios is &lt;3.5.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082874" version="1" comment="nagios-devel is &lt;3.5.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082875" version="1" comment="nagios-www is &lt;3.5.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082876" version="1" comment="nagios-www-dch is &lt;3.5.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082878" version="1" comment="chromedriver is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082880" version="1" comment="chromium is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082883" version="1" comment="chromium-desktop-gnome is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082884" version="1" comment="chromium-desktop-kde is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082885" version="1" comment="chromium-ffmpegsumo is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082887" version="1" comment="chromium-suid-helper is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082889" version="1" comment="ruby19 is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082892" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082893" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082894" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082895" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082897" version="1" comment="perl-Module-Signature is &lt;0.73-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082898" version="1" comment="seamonkey is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082901" version="1" comment="seamonkey-dom-inspector is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082902" version="1" comment="seamonkey-irc is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082903" version="1" comment="seamonkey-translations-common is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082904" version="1" comment="seamonkey-translations-other is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082905" version="1" comment="seamonkey-venkman is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082906" version="1" comment="Mesa-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082907" version="1" comment="Mesa is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082911" version="1" comment="Mesa-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082912" version="1" comment="Mesa-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082913" version="1" comment="Mesa-libEGL-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082914" version="1" comment="Mesa-libEGL-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082915" version="1" comment="Mesa-libEGL1-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082916" version="1" comment="Mesa-libEGL1 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082919" version="1" comment="Mesa-libGL-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082920" version="1" comment="Mesa-libGL-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082921" version="1" comment="Mesa-libGL1-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082922" version="1" comment="Mesa-libGL1 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082925" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082926" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082927" version="1" comment="Mesa-libGLESv1_CM1-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082928" version="1" comment="Mesa-libGLESv1_CM1 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082931" version="1" comment="Mesa-libGLESv2-2-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082932" version="1" comment="Mesa-libGLESv2-2 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082935" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082936" version="1" comment="Mesa-libGLESv2-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082937" version="1" comment="Mesa-libIndirectGL-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082938" version="1" comment="Mesa-libIndirectGL-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082939" version="1" comment="Mesa-libIndirectGL1-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082940" version="1" comment="Mesa-libIndirectGL1 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082943" version="1" comment="Mesa-libglapi-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082944" version="1" comment="Mesa-libglapi-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082945" version="1" comment="Mesa-libglapi0-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082946" version="1" comment="Mesa-libglapi0 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082949" version="1" comment="libOSMesa-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082950" version="1" comment="libOSMesa-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082951" version="1" comment="libOSMesa9-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082952" version="1" comment="libOSMesa9 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082955" version="1" comment="libXvMC_nouveau-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082956" version="1" comment="libXvMC_nouveau is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082959" version="1" comment="libXvMC_r300-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082960" version="1" comment="libXvMC_r300 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082963" version="1" comment="libXvMC_r600-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082964" version="1" comment="libXvMC_r600 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082967" version="1" comment="libXvMC_softpipe-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082968" version="1" comment="libXvMC_softpipe is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082971" version="1" comment="libgbm-devel is &lt;0.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082972" version="1" comment="libgbm-devel-32bit is &lt;0.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082973" version="1" comment="libgbm1 is &lt;0.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082974" version="1" comment="libgbm1-32bit is &lt;0.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082977" version="1" comment="libvdpau_nouveau-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082978" version="1" comment="libvdpau_nouveau is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082981" version="1" comment="libvdpau_r300-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082982" version="1" comment="libvdpau_r300 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082985" version="1" comment="libvdpau_r600-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082986" version="1" comment="libvdpau_r600 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082989" version="1" comment="libvdpau_softpipe-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082990" version="1" comment="libvdpau_softpipe is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082993" version="1" comment="libxatracker-devel is &lt;1.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082994" version="1" comment="libxatracker1 is &lt;1.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082996" version="1" comment="python-suds is &lt;0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082997" version="1" comment="qemu is &lt;1.3.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083000" version="1" comment="qemu-guest-agent is &lt;1.3.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083002" version="1" comment="qemu-linux-user is &lt;1.3.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083004" version="1" comment="qemu-tools is &lt;1.3.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083006" version="1" comment="tinyproxy is &lt;1.8.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083009" version="1" comment="cgit is &lt;0.9.1-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080476" version="1" comment="python-django is &lt;1.4.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083012" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083015" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083017" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083019" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083020" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083021" version="1" comment="libxml2-2 is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083022" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083025" version="1" comment="libxml2 is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083027" version="1" comment="libxml2-devel is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083028" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083029" version="1" comment="libxml2-doc is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083030" version="1" comment="libxml2-tools is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083032" version="1" comment="python-libxml2 is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083035" version="1" comment="nagstamon is &lt;0.9.10-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083036" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083038" version="1" comment="php5 is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083039" version="1" comment="php5-bcmath is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083041" version="1" comment="php5-bz2 is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083043" version="1" comment="php5-calendar is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083045" version="1" comment="php5-ctype is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083047" version="1" comment="php5-curl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083049" version="1" comment="php5-dba is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083053" version="1" comment="php5-devel is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083054" version="1" comment="php5-dom is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083056" version="1" comment="php5-enchant is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083058" version="1" comment="php5-exif is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083060" version="1" comment="php5-fastcgi is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083062" version="1" comment="php5-fileinfo is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083064" version="1" comment="php5-fpm is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083066" version="1" comment="php5-ftp is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083068" version="1" comment="php5-gd is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083070" version="1" comment="php5-gettext is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083072" version="1" comment="php5-gmp is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083074" version="1" comment="php5-iconv is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083076" version="1" comment="php5-imap is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083078" version="1" comment="php5-intl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083080" version="1" comment="php5-json is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083082" version="1" comment="php5-ldap is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083084" version="1" comment="php5-mbstring is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083086" version="1" comment="php5-mcrypt is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083088" version="1" comment="php5-mssql is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083090" version="1" comment="php5-mysql is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083092" version="1" comment="php5-odbc is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083094" version="1" comment="php5-openssl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083096" version="1" comment="php5-pcntl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083098" version="1" comment="php5-pdo is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083100" version="1" comment="php5-pear is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083101" version="1" comment="php5-pgsql is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083103" version="1" comment="php5-phar is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083105" version="1" comment="php5-posix is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083107" version="1" comment="php5-pspell is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083109" version="1" comment="php5-readline is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083111" version="1" comment="php5-shmop is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083113" version="1" comment="php5-snmp is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083115" version="1" comment="php5-soap is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083117" version="1" comment="php5-sockets is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083119" version="1" comment="php5-sqlite is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083121" version="1" comment="php5-suhosin is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083123" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083125" version="1" comment="php5-sysvsem is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083127" version="1" comment="php5-sysvshm is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083129" version="1" comment="php5-tidy is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083131" version="1" comment="php5-tokenizer is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083133" version="1" comment="php5-wddx is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083135" version="1" comment="php5-xmlreader is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083137" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083139" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083141" version="1" comment="php5-xsl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083143" version="1" comment="php5-zip is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083145" version="1" comment="php5-zlib is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083147" version="1" comment="kde4-kgreeter-plugins is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083149" version="1" comment="kdebase4-workspace is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083150" version="1" comment="kdebase4-workspace-branding-upstream is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083153" version="1" comment="kdebase4-workspace-devel is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083155" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083157" version="1" comment="kdebase4-workspace-liboxygenstyle-32bit is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083158" version="1" comment="kdebase4-workspace-liboxygenstyle is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083161" version="1" comment="kdebase4-workspace-plasma-calendar is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083163" version="1" comment="kdm is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083164" version="1" comment="kdm-branding-upstream is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083166" version="1" comment="kwin is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083168" version="1" comment="python-kdebase4 is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080612" version="1" comment="lcms2 is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080615" version="1" comment="liblcms2-2 is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080616" version="1" comment="liblcms2-2-32bit is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080619" version="1" comment="liblcms2-devel is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080620" version="1" comment="liblcms2-devel-32bit is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080621" version="1" comment="liblcms2-doc is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083169" version="1" comment="libsrtp1 is &lt;1.4.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083171" version="1" comment="srtp is &lt;1.4.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083173" version="1" comment="srtp-devel is &lt;1.4.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083174" version="1" comment="file-roller is &lt;3.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083177" version="1" comment="file-roller-lang is &lt;3.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083178" version="1" comment="nautilus-file-roller is &lt;3.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083180" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083182" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083184" version="1" comment="subversion is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083185" version="1" comment="subversion-bash-completion is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083188" version="1" comment="subversion-devel is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083189" version="1" comment="subversion-perl is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083191" version="1" comment="subversion-python is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083193" version="1" comment="subversion-server is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083195" version="1" comment="subversion-tools is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090978" version="1" comment="tomcat is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090979" version="1" comment="tomcat-admin-webapps is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090980" version="1" comment="tomcat-docs-webapp is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090981" version="1" comment="tomcat-el-2_2-api is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090982" version="1" comment="tomcat-javadoc is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090983" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090984" version="1" comment="tomcat-jsvc is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090985" version="1" comment="tomcat-lib is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090986" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090987" version="1" comment="tomcat-webapps is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083207" version="1" comment="libgcrypt is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083209" version="1" comment="libgcrypt-devel is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083210" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083213" version="1" comment="libgcrypt11 is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083214" version="1" comment="libgcrypt11-32bit is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083217" version="1" comment="wireshark is &lt;1.8.9-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083220" version="1" comment="wireshark-devel is &lt;1.8.9-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089965" version="1" comment="apache2 is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089968" version="1" comment="apache2-devel is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089969" version="1" comment="apache2-doc is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089970" version="1" comment="apache2-event is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089972" version="1" comment="apache2-example-pages is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089973" version="1" comment="apache2-itk is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089975" version="1" comment="apache2-prefork is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089977" version="1" comment="apache2-utils is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089979" version="1" comment="apache2-worker is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089981" version="1" comment="otrs is &lt;3.1.18-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089982" version="1" comment="otrs-doc is &lt;3.1.18-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089983" version="1" comment="otrs-itsm is &lt;3.1.10-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089984" version="1" comment="apache2-mod_security2 is &lt;2.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089987" version="1" comment="libmysqlclient-devel is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089988" version="1" comment="libmysqlclient18-32bit is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089989" version="1" comment="libmysqlclient18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089992" version="1" comment="libmysqlclient_r18-32bit is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089993" version="1" comment="libmysqlclient_r18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089994" version="1" comment="libmysqld-devel is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089995" version="1" comment="libmysqld18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089997" version="1" comment="mariadb is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089998" version="1" comment="mariadb-bench is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090000" version="1" comment="mariadb-client is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090002" version="1" comment="mariadb-debug-version is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090006" version="1" comment="mariadb-errormessages is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090007" version="1" comment="mariadb-test is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090009" version="1" comment="mariadb-tools is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090011" version="1" comment="libmysql55client18-32bit is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090012" version="1" comment="libmysql55client18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090015" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090016" version="1" comment="libmysql55client_r18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090017" version="1" comment="mysql-community-server is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090018" version="1" comment="mysql-community-server-bench is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090020" version="1" comment="mysql-community-server-client is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090022" version="1" comment="mysql-community-server-debug-version is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090026" version="1" comment="mysql-community-server-errormessages is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090027" version="1" comment="mysql-community-server-test is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090029" version="1" comment="mysql-community-server-tools is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090031" version="1" comment="strongswan is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090033" version="1" comment="strongswan-doc is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090034" version="1" comment="strongswan-ipsec is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090036" version="1" comment="strongswan-libs0 is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090038" version="1" comment="strongswan-mysql is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090040" version="1" comment="strongswan-nm is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090042" version="1" comment="strongswan-sqlite is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090044" version="1" comment="python-glanceclient is &lt;0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090045" version="1" comment="python-glanceclient-test is &lt;0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090121" version="1" comment="samba-doc is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090122" version="1" comment="libnetapi-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090123" version="1" comment="libnetapi0 is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090125" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090126" version="1" comment="libsmbclient0 is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090127" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090130" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090131" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090133" version="1" comment="libwbclient-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090134" version="1" comment="libwbclient0 is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090135" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090138" version="1" comment="samba is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090139" version="1" comment="samba-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090140" version="1" comment="samba-client is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090141" version="1" comment="samba-client-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090147" version="1" comment="samba-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090148" version="1" comment="samba-krb-printing is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090150" version="1" comment="samba-winbind is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090151" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090390" version="1" comment="libzypp is &lt;12.15.0-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090393" version="1" comment="libzypp-devel is &lt;12.15.0-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090046" version="1" comment="phpMyAdmin is &lt;4.0.5-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090154" version="1" comment="MozillaFirefox is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090155" version="1" comment="MozillaFirefox-branding-upstream is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090156" version="1" comment="MozillaFirefox-buildsymbols is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090159" version="1" comment="MozillaFirefox-devel is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090160" version="1" comment="MozillaFirefox-translations-common is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090161" version="1" comment="MozillaFirefox-translations-other is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090162" version="1" comment="MozillaThunderbird is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090163" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090166" version="1" comment="MozillaThunderbird-devel is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090168" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090169" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090170" version="1" comment="enigmail is &lt;1.5.2+17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090172" version="1" comment="mozilla-nspr-32bit is &lt;4.10-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090173" version="1" comment="mozilla-nspr is &lt;4.10-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090177" version="1" comment="mozilla-nspr-devel is &lt;4.10-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090178" version="1" comment="libfreebl3 is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090179" version="1" comment="libfreebl3-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090182" version="1" comment="libsoftokn3 is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090183" version="1" comment="libsoftokn3-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090186" version="1" comment="mozilla-nss is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090187" version="1" comment="mozilla-nss-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090188" version="1" comment="mozilla-nss-certs is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090189" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090195" version="1" comment="mozilla-nss-devel is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090196" version="1" comment="mozilla-nss-sysinit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090197" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090200" version="1" comment="mozilla-nss-tools is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090202" version="1" comment="seamonkey is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090205" version="1" comment="seamonkey-dom-inspector is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090206" version="1" comment="seamonkey-irc is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090207" version="1" comment="seamonkey-translations-common is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090208" version="1" comment="seamonkey-translations-other is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090209" version="1" comment="seamonkey-venkman is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090210" version="1" comment="mozilla-js is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090211" version="1" comment="mozilla-js-32bit is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090214" version="1" comment="xulrunner is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090215" version="1" comment="xulrunner-32bit is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090216" version="1" comment="xulrunner-buildsymbols is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090220" version="1" comment="xulrunner-devel is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090245" version="1" comment="bind is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090246" version="1" comment="bind-chrootenv is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090249" version="1" comment="bind-devel is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090250" version="1" comment="bind-doc is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090251" version="1" comment="bind-libs-32bit is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090252" version="1" comment="bind-libs is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090255" version="1" comment="bind-lwresd is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090257" version="1" comment="bind-utils is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090222" version="1" comment="filezilla is &lt;3.7.3-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090225" version="1" comment="filezilla-lang is &lt;3.7.3-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090259" version="1" comment="putty is &lt;0.63-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090291" version="1" comment="puppet is &lt;3.0.2-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090292" version="1" comment="puppet-server is &lt;3.0.2-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090306" version="1" comment="cacti is &lt;0.8.8b-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090351" version="1" comment="ruby is &lt;1.9.3-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090352" version="1" comment="ruby-devel is &lt;1.9.3-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090353" version="1" comment="xen is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090355" version="1" comment="xen-devel is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090356" version="1" comment="xen-kmp-default is &lt;4.2.2_06_k3.7.10_1.16-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090358" version="1" comment="xen-kmp-desktop is &lt;4.2.2_06_k3.7.10_1.16-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090360" version="1" comment="xen-kmp-pae is &lt;4.2.2_06_k3.7.10_1.16-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090362" version="1" comment="xen-libs-32bit is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090363" version="1" comment="xen-libs is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090366" version="1" comment="xen-tools-domU is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090368" version="1" comment="xen-doc-html is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090369" version="1" comment="xen-doc-pdf is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090370" version="1" comment="xen-tools is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090385" version="1" comment="roundcubemail is &lt;0.9.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090472" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090473" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090476" version="1" comment="python-base is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090477" version="1" comment="python-base-32bit is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090481" version="1" comment="python-devel is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090482" version="1" comment="python-xml is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090484" version="1" comment="python-doc is &lt;2.7-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090485" version="1" comment="python-doc-pdf is &lt;2.7-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090486" version="1" comment="python is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090487" version="1" comment="python-32bit is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090488" version="1" comment="python-curses is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090493" version="1" comment="python-demo is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090494" version="1" comment="python-gdbm is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090496" version="1" comment="python-idle is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090497" version="1" comment="python-tk is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090499" version="1" comment="libpython3_3m1_0 is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090500" version="1" comment="libpython3_3m1_0-32bit is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090503" version="1" comment="python3-base is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090504" version="1" comment="python3-base-32bit is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090508" version="1" comment="python3-devel is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090510" version="1" comment="python3-idle is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090511" version="1" comment="python3-testsuite is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090513" version="1" comment="python3-tools is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090514" version="1" comment="python3-doc is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090515" version="1" comment="python3-doc-pdf is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090516" version="1" comment="python3 is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090517" version="1" comment="python3-32bit is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090518" version="1" comment="python3-curses is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090520" version="1" comment="python3-dbm is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090525" version="1" comment="python3-tk is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090527" version="1" comment="squid is &lt;3.2.11-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090530" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090532" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090534" version="1" comment="subversion is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090535" version="1" comment="subversion-bash-completion is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090538" version="1" comment="subversion-devel is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090539" version="1" comment="subversion-perl is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090541" version="1" comment="subversion-python is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090543" version="1" comment="subversion-server is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090545" version="1" comment="subversion-tools is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090703" version="1" comment="wireshark is &lt;1.8.10-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090706" version="1" comment="wireshark-devel is &lt;1.8.10-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090707" version="1" comment="libtiff-devel-32bit is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090708" version="1" comment="libtiff-devel is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090709" version="1" comment="libtiff5-32bit is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090710" version="1" comment="libtiff5 is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090713" version="1" comment="tiff is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090760" version="1" comment="gpg2 is &lt;2.0.19-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090763" version="1" comment="gpg2-lang is &lt;2.0.19-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090723" version="1" comment="mozilla-js is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090724" version="1" comment="mozilla-js-32bit is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090727" version="1" comment="xulrunner is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090728" version="1" comment="xulrunner-32bit is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090729" version="1" comment="xulrunner-buildsymbols is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090733" version="1" comment="xulrunner-devel is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090764" version="1" comment="MozillaFirefox is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090765" version="1" comment="MozillaFirefox-branding-upstream is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090766" version="1" comment="MozillaFirefox-buildsymbols is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090769" version="1" comment="MozillaFirefox-devel is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090770" version="1" comment="MozillaFirefox-translations-common is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090771" version="1" comment="MozillaFirefox-translations-other is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090772" version="1" comment="MozillaThunderbird is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090773" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090776" version="1" comment="MozillaThunderbird-devel is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090777" version="1" comment="MozillaThunderbird-translations-common is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090778" version="1" comment="MozillaThunderbird-translations-other is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090779" version="1" comment="enigmail is &lt;1.5.2+24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090781" version="1" comment="seamonkey is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090784" version="1" comment="seamonkey-dom-inspector is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090785" version="1" comment="seamonkey-irc is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090786" version="1" comment="seamonkey-translations-common is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090787" version="1" comment="seamonkey-translations-other is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090788" version="1" comment="seamonkey-venkman is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090759" version="1" comment="python-django is &lt;1.4.8-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090880" version="1" comment="boost is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090881" version="1" comment="boost-devel is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090882" version="1" comment="boost-devel-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090883" version="1" comment="boost-doc-html is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090884" version="1" comment="boost-doc-man is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090885" version="1" comment="boost-doc-pdf is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090886" version="1" comment="boost-license1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090887" version="1" comment="libboost_chrono1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090888" version="1" comment="libboost_date_time1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090889" version="1" comment="libboost_date_time1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090890" version="1" comment="libboost_filesystem1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090891" version="1" comment="libboost_filesystem1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090892" version="1" comment="libboost_graph1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090893" version="1" comment="libboost_graph1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090894" version="1" comment="libboost_iostreams1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090895" version="1" comment="libboost_iostreams1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090896" version="1" comment="libboost_locale1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090897" version="1" comment="libboost_math1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090898" version="1" comment="libboost_math1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090899" version="1" comment="libboost_mpi1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090900" version="1" comment="libboost_mpi1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090901" version="1" comment="libboost_program_options1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090902" version="1" comment="libboost_program_options1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090903" version="1" comment="libboost_python1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090904" version="1" comment="libboost_python1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090905" version="1" comment="libboost_random1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090906" version="1" comment="libboost_random1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090907" version="1" comment="libboost_regex1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090908" version="1" comment="libboost_regex1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090909" version="1" comment="libboost_serialization1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090910" version="1" comment="libboost_serialization1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090911" version="1" comment="libboost_signals1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090912" version="1" comment="libboost_signals1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090913" version="1" comment="libboost_system1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090914" version="1" comment="libboost_system1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090915" version="1" comment="libboost_test1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090916" version="1" comment="libboost_test1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090917" version="1" comment="libboost_thread1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090918" version="1" comment="libboost_thread1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090919" version="1" comment="libboost_timer1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090920" version="1" comment="libboost_wave1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090921" version="1" comment="libboost_wave1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090796" version="1" comment="glibc-testsuite is &lt;2.17-4.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090797" version="1" comment="glibc-utils is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090798" version="1" comment="glibc-utils-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090802" version="1" comment="glibc is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090803" version="1" comment="glibc-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090807" version="1" comment="glibc-devel is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090808" version="1" comment="glibc-devel-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090811" version="1" comment="glibc-devel-static is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090812" version="1" comment="glibc-devel-static-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090813" version="1" comment="glibc-extra is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090815" version="1" comment="glibc-i18ndata is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090816" version="1" comment="glibc-info is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090817" version="1" comment="glibc-locale is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090818" version="1" comment="glibc-locale-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090821" version="1" comment="glibc-obsolete is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090823" version="1" comment="glibc-profile is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090824" version="1" comment="glibc-profile-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090825" version="1" comment="nscd is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090827" version="1" comment="glibc-html is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090828" version="1" comment="glibc-testsuite is &lt;2.17-4.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090930" version="1" comment="libudev-mini-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090931" version="1" comment="libudev-mini1 is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090932" version="1" comment="systemd-mini is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090933" version="1" comment="systemd-mini-analyze is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090934" version="1" comment="systemd-mini-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090935" version="1" comment="systemd-mini-sysvinit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090936" version="1" comment="udev-mini is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090937" version="1" comment="libgudev-1_0-0 is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090938" version="1" comment="libgudev-1_0-0-32bit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090939" version="1" comment="libgudev-1_0-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090940" version="1" comment="libudev-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090941" version="1" comment="libudev1 is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090942" version="1" comment="libudev1-32bit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090943" version="1" comment="systemd is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090944" version="1" comment="systemd-32bit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090945" version="1" comment="systemd-analyze is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090946" version="1" comment="systemd-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090947" version="1" comment="systemd-logger is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090948" version="1" comment="systemd-sysvinit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090949" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090950" version="1" comment="udev is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090829" version="1" comment="icedtea-web is &lt;1.4.1-4.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090832" version="1" comment="icedtea-web-javadoc is &lt;1.4.1-4.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092480" version="1" comment="kernel-debug is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092481" version="1" comment="kernel-debug-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092482" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092483" version="1" comment="kernel-default is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092484" version="1" comment="kernel-default-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092485" version="1" comment="kernel-default-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092486" version="1" comment="kernel-desktop is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092487" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092488" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092489" version="1" comment="kernel-docs is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092490" version="1" comment="kernel-ec2 is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092491" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092492" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092493" version="1" comment="kernel-pae is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092494" version="1" comment="kernel-pae-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092495" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092496" version="1" comment="kernel-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092497" version="1" comment="kernel-source is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092498" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092499" version="1" comment="kernel-syms is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092500" version="1" comment="kernel-trace is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092501" version="1" comment="kernel-trace-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092502" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092503" version="1" comment="kernel-vanilla is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092504" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092505" version="1" comment="kernel-xen is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092506" version="1" comment="kernel-xen-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092507" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090988" version="1" comment="libfreebl3 is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090989" version="1" comment="libfreebl3-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090990" version="1" comment="libsoftokn3 is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090991" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090992" version="1" comment="mozilla-nss is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090993" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090994" version="1" comment="mozilla-nss-certs is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090995" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090996" version="1" comment="mozilla-nss-devel is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090997" version="1" comment="mozilla-nss-sysinit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090998" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090999" version="1" comment="mozilla-nss-tools is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091015" version="1" comment="rtkit is &lt;0.11_git201205151338-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091000" version="1" comment="clutter is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091001" version="1" comment="clutter-devel is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091002" version="1" comment="clutter-lang is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091003" version="1" comment="libclutter-1_0-0 is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091004" version="1" comment="libclutter-1_0-0-32bit is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091005" version="1" comment="typelib-1_0-Clutter-1_0 is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091032" version="1" comment="libvirt is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091033" version="1" comment="libvirt-client is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091034" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091035" version="1" comment="libvirt-devel is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091036" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091037" version="1" comment="libvirt-doc is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091038" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091039" version="1" comment="libvirt-python is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091057" version="1" comment="chromedriver is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091058" version="1" comment="chromium is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091059" version="1" comment="chromium-desktop-gnome is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091060" version="1" comment="chromium-desktop-kde is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091061" version="1" comment="chromium-ffmpegsumo is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091062" version="1" comment="chromium-suid-helper is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091016" version="1" comment="lcms is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091017" version="1" comment="liblcms-devel is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091018" version="1" comment="liblcms-devel-32bit is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091019" version="1" comment="liblcms1 is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091020" version="1" comment="liblcms1-32bit is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091021" version="1" comment="python-lcms is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091022" version="1" comment="gpg2 is &lt;2.0.19-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091023" version="1" comment="gpg2-lang is &lt;2.0.19-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091088" version="1" comment="proftpd is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091089" version="1" comment="proftpd-devel is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091090" version="1" comment="proftpd-doc is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091091" version="1" comment="proftpd-lang is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091092" version="1" comment="proftpd-ldap is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091093" version="1" comment="proftpd-mysql is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091094" version="1" comment="proftpd-pgsql is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091095" version="1" comment="proftpd-radius is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091096" version="1" comment="proftpd-sqlite is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091097" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091098" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091099" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091100" version="1" comment="libspice-controller0 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091101" version="1" comment="python-SpiceClientGtk is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091102" version="1" comment="spice-gtk is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091103" version="1" comment="spice-gtk-devel is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091104" version="1" comment="spice-gtk-lang is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091105" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091106" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091107" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091063" version="1" comment="ncat is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091064" version="1" comment="ndiff is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091065" version="1" comment="nmap is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091066" version="1" comment="nping is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091067" version="1" comment="zenmap is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091110" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-114.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091111" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-114.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091122" version="1" comment="libzrtpcpp is &lt;2.0.0-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091123" version="1" comment="libzrtpcpp-devel is &lt;2.0.0-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091124" version="1" comment="libzrtpcpp2 is &lt;2.0.0-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091147" version="1" comment="dropbear is &lt;2013.60-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091135" version="1" comment="ruby19 is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091136" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091137" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091138" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091139" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091140" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091141" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091142" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091143" version="1" comment="apache2-mod_fcgid is &lt;2.3.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091148" version="1" comment="hplip is &lt;3.12.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091149" version="1" comment="hplip-hpijs is &lt;3.12.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091150" version="1" comment="hplip-sane is &lt;3.12.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091348" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091349" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091350" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091351" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091352" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091252" version="1" comment="libmodplug is &lt;0.8.8.4-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091253" version="1" comment="libmodplug-devel is &lt;0.8.8.4-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091254" version="1" comment="libmodplug1 is &lt;0.8.8.4-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091255" version="1" comment="libmodplug1-32bit is &lt;0.8.8.4-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091207" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091208" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091209" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091210" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091211" version="1" comment="openssl is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091212" version="1" comment="openssl-doc is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092255" version="1" comment="xen is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092256" version="1" comment="xen-devel is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092257" version="1" comment="xen-kmp-default is &lt;4.2.3_01_k3.7.10_1.16-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092258" version="1" comment="xen-kmp-desktop is &lt;4.2.3_01_k3.7.10_1.16-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092259" version="1" comment="xen-kmp-pae is &lt;4.2.3_01_k3.7.10_1.16-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092260" version="1" comment="xen-libs-32bit is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092261" version="1" comment="xen-libs is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092262" version="1" comment="xen-tools-domU is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092263" version="1" comment="xen-doc-html is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092264" version="1" comment="xen-doc-pdf is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092265" version="1" comment="xen-tools is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091256" version="1" comment="MozillaFirefox is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091257" version="1" comment="MozillaFirefox-branding-upstream is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091258" version="1" comment="MozillaFirefox-buildsymbols is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091259" version="1" comment="MozillaFirefox-devel is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091260" version="1" comment="MozillaFirefox-translations-common is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091261" version="1" comment="MozillaFirefox-translations-other is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091262" version="1" comment="MozillaThunderbird is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091263" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091264" version="1" comment="MozillaThunderbird-devel is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091265" version="1" comment="MozillaThunderbird-translations-common is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091266" version="1" comment="MozillaThunderbird-translations-other is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091267" version="1" comment="enigmail is &lt;1.6.0+24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091268" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091269" version="1" comment="mozilla-nspr is &lt;4.10.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091270" version="1" comment="mozilla-nspr-devel is &lt;4.10.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091271" version="1" comment="mozilla-js is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091272" version="1" comment="mozilla-js-32bit is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091273" version="1" comment="xulrunner is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091274" version="1" comment="xulrunner-32bit is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091275" version="1" comment="xulrunner-buildsymbols is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091276" version="1" comment="xulrunner-devel is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091315" version="1" comment="python-pyOpenSSL-doc is &lt;0.13.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091316" version="1" comment="python-pyOpenSSL is &lt;0.13.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091317" version="1" comment="openvpn is &lt;2.2.2-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091318" version="1" comment="openvpn-auth-pam-plugin is &lt;2.2.2-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091319" version="1" comment="openvpn-down-root-plugin is &lt;2.2.2-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091721" version="1" comment="seamonkey is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091722" version="1" comment="seamonkey-dom-inspector is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091723" version="1" comment="seamonkey-irc is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091724" version="1" comment="seamonkey-translations-common is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091725" version="1" comment="seamonkey-translations-other is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091726" version="1" comment="seamonkey-venkman is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091320" version="1" comment="strongswan is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091321" version="1" comment="strongswan-doc is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091322" version="1" comment="strongswan-ipsec is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091323" version="1" comment="strongswan-libs0 is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091324" version="1" comment="strongswan-mysql is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091325" version="1" comment="strongswan-nm is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091326" version="1" comment="strongswan-sqlite is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091419" version="1" comment="libvarnishapi1 is &lt;3.0.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091420" version="1" comment="varnish is &lt;3.0.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091421" version="1" comment="varnish-devel is &lt;3.0.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091353" version="1" comment="apache2-mod_fcgid is &lt;2.3.6-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091361" version="1" comment="wireshark is &lt;1.8.11-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091362" version="1" comment="wireshark-devel is &lt;1.8.11-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091363" version="1" comment="whois is &lt;5.0.26-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091686" version="1" comment="chromedriver is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091687" version="1" comment="chromium is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091688" version="1" comment="chromium-desktop-gnome is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091689" version="1" comment="chromium-desktop-kde is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091690" version="1" comment="chromium-ffmpegsumo is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091691" version="1" comment="chromium-suid-helper is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091727" version="1" comment="samba-doc is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091728" version="1" comment="libnetapi-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091729" version="1" comment="libnetapi0 is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091730" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091731" version="1" comment="libsmbclient0 is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091732" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091733" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091734" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091735" version="1" comment="libwbclient-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091736" version="1" comment="libwbclient0 is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091737" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091738" version="1" comment="samba is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091739" version="1" comment="samba-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091740" version="1" comment="samba-client is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091741" version="1" comment="samba-client-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091742" version="1" comment="samba-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091743" version="1" comment="samba-krb-printing is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091744" version="1" comment="samba-winbind is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091745" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091522" version="1" comment="krb5-doc is &lt;1.10.2-10.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091523" version="1" comment="krb5-mini is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091524" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091525" version="1" comment="krb5 is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091526" version="1" comment="krb5-32bit is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091527" version="1" comment="krb5-client is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091528" version="1" comment="krb5-devel is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091529" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091530" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091531" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091532" version="1" comment="krb5-server is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091465" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091466" version="1" comment="mozilla-nspr is &lt;4.10.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091467" version="1" comment="mozilla-nspr-devel is &lt;4.10.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091468" version="1" comment="libfreebl3 is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091469" version="1" comment="libfreebl3-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091470" version="1" comment="libsoftokn3 is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091471" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091472" version="1" comment="mozilla-nss is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091473" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091474" version="1" comment="mozilla-nss-certs is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091475" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091476" version="1" comment="mozilla-nss-devel is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091477" version="1" comment="mozilla-nss-sysinit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091478" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091479" version="1" comment="mozilla-nss-tools is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092047" version="1" comment="gtk3 is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092048" version="1" comment="gtk3-branding-upstream is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092049" version="1" comment="gtk3-data is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092050" version="1" comment="gtk3-devel is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092051" version="1" comment="gtk3-devel-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092052" version="1" comment="gtk3-immodule-amharic is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092053" version="1" comment="gtk3-immodule-amharic-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092054" version="1" comment="gtk3-immodule-inuktitut is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092055" version="1" comment="gtk3-immodule-inuktitut-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092056" version="1" comment="gtk3-immodule-multipress is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092057" version="1" comment="gtk3-immodule-multipress-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092058" version="1" comment="gtk3-immodule-thai is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092059" version="1" comment="gtk3-immodule-thai-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092060" version="1" comment="gtk3-immodule-vietnamese is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092061" version="1" comment="gtk3-immodule-vietnamese-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092062" version="1" comment="gtk3-immodule-xim is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092063" version="1" comment="gtk3-immodule-xim-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092064" version="1" comment="gtk3-immodules-tigrigna is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092065" version="1" comment="gtk3-immodules-tigrigna-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092066" version="1" comment="gtk3-lang is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092067" version="1" comment="gtk3-tools is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092068" version="1" comment="gtk3-tools-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092069" version="1" comment="libgtk-3-0 is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092070" version="1" comment="libgtk-3-0-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092071" version="1" comment="typelib-1_0-Gtk-3_0 is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092072" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092073" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092074" version="1" comment="gtk2-engine-svg is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092075" version="1" comment="gtk2-engine-svg-32bit is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092076" version="1" comment="librsvg-2-2 is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092077" version="1" comment="librsvg-2-2-32bit is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092078" version="1" comment="librsvg is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092079" version="1" comment="librsvg-devel is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092080" version="1" comment="rsvg-view is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092081" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091594" version="1" comment="nginx is &lt;1.2.9-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091757" version="1" comment="horde5 is &lt;5.0.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091895" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091896" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091897" version="1" comment="subversion is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091898" version="1" comment="subversion-bash-completion is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091899" version="1" comment="subversion-devel is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091900" version="1" comment="subversion-perl is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091901" version="1" comment="subversion-python is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091902" version="1" comment="subversion-server is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091903" version="1" comment="subversion-tools is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091813" version="1" comment="ruby19 is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091814" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091815" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091816" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091817" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091904" version="1" comment="curl is &lt;7.28.1-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091905" version="1" comment="libcurl-devel is &lt;7.28.1-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091906" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091907" version="1" comment="libcurl4 is &lt;7.28.1-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091908" version="1" comment="nodejs is &lt;0.8.12-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091909" version="1" comment="nodejs-devel is &lt;0.8.12-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091910" version="1" comment="thttpd is &lt;2.25b-195.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091987" version="1" comment="ca-certificates-mozilla is &lt;1.95-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092208" version="1" comment="chromedriver is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092209" version="1" comment="chromium is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092210" version="1" comment="chromium-desktop-gnome is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092211" version="1" comment="chromium-desktop-kde is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092212" version="1" comment="chromium-ffmpegsumo is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092213" version="1" comment="chromium-suid-helper is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092082" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092083" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092084" version="1" comment="MozillaFirefox is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092085" version="1" comment="MozillaFirefox-branding-upstream is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092086" version="1" comment="MozillaFirefox-buildsymbols is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092087" version="1" comment="MozillaFirefox-devel is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092088" version="1" comment="MozillaFirefox-translations-common is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092089" version="1" comment="MozillaFirefox-translations-other is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092266" version="1" comment="MozillaThunderbird is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092267" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092268" version="1" comment="MozillaThunderbird-devel is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092269" version="1" comment="MozillaThunderbird-translations-common is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092270" version="1" comment="MozillaThunderbird-translations-other is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092271" version="1" comment="enigmail is &lt;1.6.0+24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092927" version="1" comment="lighttpd is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092928" version="1" comment="lighttpd-mod_cml is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092929" version="1" comment="lighttpd-mod_geoip is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092930" version="1" comment="lighttpd-mod_magnet is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092931" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092932" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092933" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092934" version="1" comment="lighttpd-mod_webdav is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091950" version="1" comment="libfreebl3 is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091951" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091952" version="1" comment="libsoftokn3 is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091953" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091954" version="1" comment="mozilla-nss is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091955" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091956" version="1" comment="mozilla-nss-certs is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091957" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091958" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091959" version="1" comment="mozilla-nss-sysinit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091960" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091961" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092214" version="1" comment="rubygem-i18n is &lt;0.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092215" version="1" comment="rubygem-i18n-doc is &lt;0.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092216" version="1" comment="rubygem-i18n-testsuite is &lt;0.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092217" version="1" comment="openttd is &lt;1.3.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092218" version="1" comment="openttd-data is &lt;1.3.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092219" version="1" comment="openttd-dedicated is &lt;1.3.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092220" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092221" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092222" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092223" version="1" comment="rubygem-actionmailer-3_2-doc is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092537" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092538" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092539" version="1" comment="seamonkey is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092540" version="1" comment="seamonkey-dom-inspector is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092541" version="1" comment="seamonkey-irc is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092542" version="1" comment="seamonkey-translations-common is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092543" version="1" comment="seamonkey-translations-other is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092544" version="1" comment="seamonkey-venkman is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092272" version="1" comment="libv8-3 is &lt;3.22.24.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092273" version="1" comment="v8 is &lt;3.22.24.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092274" version="1" comment="v8-devel is &lt;3.22.24.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092275" version="1" comment="v8-private-headers-devel is &lt;3.22.24.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092276" version="1" comment="webyast-base is &lt;0.3.43.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092277" version="1" comment="webyast-base-branding-default is &lt;0.3.43.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092278" version="1" comment="webyast-base-testsuite is &lt;0.3.43.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092421" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092422" version="1" comment="php5 is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092423" version="1" comment="php5-bcmath is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092424" version="1" comment="php5-bz2 is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092425" version="1" comment="php5-calendar is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092426" version="1" comment="php5-ctype is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092427" version="1" comment="php5-curl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092428" version="1" comment="php5-dba is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092429" version="1" comment="php5-devel is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092430" version="1" comment="php5-dom is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092431" version="1" comment="php5-enchant is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092432" version="1" comment="php5-exif is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092433" version="1" comment="php5-fastcgi is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092434" version="1" comment="php5-fileinfo is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092435" version="1" comment="php5-fpm is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092436" version="1" comment="php5-ftp is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092437" version="1" comment="php5-gd is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092438" version="1" comment="php5-gettext is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092439" version="1" comment="php5-gmp is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092440" version="1" comment="php5-iconv is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092441" version="1" comment="php5-imap is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092442" version="1" comment="php5-intl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092443" version="1" comment="php5-json is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092444" version="1" comment="php5-ldap is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092445" version="1" comment="php5-mbstring is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092446" version="1" comment="php5-mcrypt is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092447" version="1" comment="php5-mssql is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092448" version="1" comment="php5-mysql is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092449" version="1" comment="php5-odbc is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092450" version="1" comment="php5-openssl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092451" version="1" comment="php5-pcntl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092452" version="1" comment="php5-pdo is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092453" version="1" comment="php5-pear is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092454" version="1" comment="php5-pgsql is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092455" version="1" comment="php5-phar is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092456" version="1" comment="php5-posix is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092457" version="1" comment="php5-pspell is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092458" version="1" comment="php5-readline is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092459" version="1" comment="php5-shmop is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092460" version="1" comment="php5-snmp is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092461" version="1" comment="php5-soap is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092462" version="1" comment="php5-sockets is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092463" version="1" comment="php5-sqlite is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092464" version="1" comment="php5-suhosin is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092465" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092466" version="1" comment="php5-sysvsem is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092467" version="1" comment="php5-sysvshm is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092468" version="1" comment="php5-tidy is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092469" version="1" comment="php5-tokenizer is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092470" version="1" comment="php5-wddx is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092471" version="1" comment="php5-xmlreader is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092472" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092473" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092474" version="1" comment="php5-xsl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092475" version="1" comment="php5-zip is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092476" version="1" comment="php5-zlib is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092545" version="1" comment="wireshark is &lt;1.8.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092546" version="1" comment="wireshark-devel is &lt;1.8.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092477" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092478" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092479" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092547" version="1" comment="libpixman-1-0 is &lt;0.28.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092548" version="1" comment="libpixman-1-0-32bit is &lt;0.28.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092549" version="1" comment="libpixman-1-0-devel is &lt;0.28.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092550" version="1" comment="pixman is &lt;0.28.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092551" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092552" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092553" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092554" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092555" version="1" comment="openssl is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092556" version="1" comment="openssl-doc is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092557" version="1" comment="nagios is &lt;3.5.0-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092558" version="1" comment="nagios-devel is &lt;3.5.0-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092559" version="1" comment="nagios-www is &lt;3.5.0-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092560" version="1" comment="nagios-www-dch is &lt;3.5.0-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092708" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092709" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092710" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092711" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092712" version="1" comment="openssl is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092713" version="1" comment="openssl-doc is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092935" version="1" comment="libqt4-devel-doc is &lt;4.8.4-3.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092936" version="1" comment="libqt4-devel-doc-data is &lt;4.8.4-3.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092937" version="1" comment="qt4-x11-tools is &lt;4.8.4-3.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092938" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092939" version="1" comment="libqt4-sql-mysql is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092940" version="1" comment="libqt4-sql-plugins is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092941" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092942" version="1" comment="libqt4-sql-postgresql is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092943" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092944" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092945" version="1" comment="libqt4-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092946" version="1" comment="libqt4 is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092947" version="1" comment="libqt4-devel is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092948" version="1" comment="libqt4-private-headers-devel is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092949" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092950" version="1" comment="libqt4-qt3support is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092951" version="1" comment="libqt4-sql-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092952" version="1" comment="libqt4-sql is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092953" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092954" version="1" comment="libqt4-sql-sqlite is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092955" version="1" comment="libqt4-x11-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092956" version="1" comment="libqt4-x11 is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093009" version="1" comment="icinga is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093010" version="1" comment="icinga-devel is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093011" version="1" comment="icinga-doc is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093012" version="1" comment="icinga-idoutils is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093013" version="1" comment="icinga-idoutils-mysql is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093014" version="1" comment="icinga-idoutils-oracle is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093015" version="1" comment="icinga-idoutils-pgsql is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093016" version="1" comment="icinga-plugins-downtimes is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093017" version="1" comment="icinga-plugins-eventhandlers is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093018" version="1" comment="icinga-www is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093019" version="1" comment="monitoring-tools is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093020" version="1" comment="nagios-rpm-macros is &lt;0.08-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092957" version="1" comment="lightdm-gtk-greeter is &lt;1.3.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092958" version="1" comment="lightdm-gtk-greeter-branding-upstream is &lt;1.3.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092959" version="1" comment="lightdm-gtk-greeter-lang is &lt;1.3.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093021" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093022" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093023" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093024" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093025" version="1" comment="openssl is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093026" version="1" comment="openssl-doc is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092960" version="1" comment="libXfont is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092961" version="1" comment="libXfont-devel is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092962" version="1" comment="libXfont-devel-32bit is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092963" version="1" comment="libXfont1 is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092964" version="1" comment="libXfont1-32bit is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093112" version="1" comment="gnumeric is &lt;1.12.0-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093113" version="1" comment="gnumeric-devel is &lt;1.12.0-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093114" version="1" comment="gnumeric-lang is &lt;1.12.0-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093059" version="1" comment="cups is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093060" version="1" comment="cups-client is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093061" version="1" comment="cups-ddk is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093062" version="1" comment="cups-devel is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093063" version="1" comment="cups-libs is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093064" version="1" comment="cups-libs-32bit is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093074" version="1" comment="hplip is &lt;3.12.11-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093075" version="1" comment="hplip-hpijs is &lt;3.12.11-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093076" version="1" comment="hplip-sane is &lt;3.12.11-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093226" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093227" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093228" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093229" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093230" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093231" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093232" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093150" version="1" comment="tor is &lt;0.2.3.25-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093374" version="1" comment="libpoppler-qt4-4 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093375" version="1" comment="libpoppler-qt4-devel is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093376" version="1" comment="poppler-qt is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093377" version="1" comment="libpoppler-cpp0 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093378" version="1" comment="libpoppler-devel is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093379" version="1" comment="libpoppler-glib-devel is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093380" version="1" comment="libpoppler-glib8 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093381" version="1" comment="libpoppler34 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093382" version="1" comment="poppler is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093383" version="1" comment="poppler-tools is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093384" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093283" version="1" comment="bind is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093284" version="1" comment="bind-chrootenv is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093285" version="1" comment="bind-devel is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093286" version="1" comment="bind-doc is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093287" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093288" version="1" comment="bind-libs is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093289" version="1" comment="bind-lwresd is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093290" version="1" comment="bind-utils is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093291" version="1" comment="qemu is &lt;1.3.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093292" version="1" comment="qemu-guest-agent is &lt;1.3.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093293" version="1" comment="qemu-linux-user is &lt;1.3.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093294" version="1" comment="qemu-tools is &lt;1.3.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093642" version="1" comment="bot-sentry is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093643" version="1" comment="libpurple-plugin-bot-sentry is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093644" version="1" comment="libpurple-plugin-bot-sentry-lang is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093645" version="1" comment="pidgin-advanced-sound-notification is &lt;1.2.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093646" version="1" comment="pidgin-advanced-sound-notification-lang is &lt;1.2.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093647" version="1" comment="pidgin-plugin-advanced-sound-notification is &lt;1.2.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093648" version="1" comment="pidgin-birthday-reminder is &lt;1.7-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093649" version="1" comment="pidgin-birthday-reminder-lang is &lt;1.7-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093650" version="1" comment="pidgin-plugin-birthday-reminder is &lt;1.7-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093651" version="1" comment="libpurple-branding-openSUSE is &lt;12.2-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093652" version="1" comment="pidgin-branding-openSUSE is &lt;12.2-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093653" version="1" comment="pidgin-embeddedvideo is &lt;1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093654" version="1" comment="pidgin-plugin-embeddedvideo is &lt;1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093655" version="1" comment="libpurple-plugin-facebookchat is &lt;1.69-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093656" version="1" comment="pidgin-facebookchat is &lt;1.69-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093657" version="1" comment="pidgin-guifications is &lt;2.16-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093658" version="1" comment="pidgin-guifications-lang is &lt;2.16-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093659" version="1" comment="pidgin-plugin-guifications is &lt;2.16-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093660" version="1" comment="libpurple-plugin-mrim is &lt;0.1.28-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093661" version="1" comment="libpurple-plugin-mrim-lang is &lt;0.1.28-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093662" version="1" comment="pidgin-mrim is &lt;0.1.28-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093663" version="1" comment="libpurple-plugin-openfetion is &lt;0.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093664" version="1" comment="libpurple-plugin-openfetion-lang is &lt;0.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093665" version="1" comment="pidgin-openfetion is &lt;0.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093666" version="1" comment="pidgin-otr is &lt;4.0.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093667" version="1" comment="libpurple-plugin-sipe is &lt;1.14.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093668" version="1" comment="pidgin-sipe is &lt;1.14.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093669" version="1" comment="telepathy-plugin-sipe is &lt;1.14.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093670" version="1" comment="finch is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093671" version="1" comment="finch-devel is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093672" version="1" comment="libpurple is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093673" version="1" comment="libpurple-branding-upstream is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093674" version="1" comment="libpurple-devel is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093675" version="1" comment="libpurple-lang is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093676" version="1" comment="libpurple-meanwhile is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093677" version="1" comment="libpurple-tcl is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093678" version="1" comment="pidgin is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093679" version="1" comment="pidgin-devel is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093680" version="1" comment="libpurple-plugin-pack is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093681" version="1" comment="libpurple-plugin-pack-extras is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093682" version="1" comment="pidgin-plugin-pack is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093683" version="1" comment="pidgin-plugin-pack-extras is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093684" version="1" comment="purple-plugin-pack is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093685" version="1" comment="purple-plugin-pack-lang is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093686" version="1" comment="libpurple-plugin-skype is &lt;0.0.1.rev624-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093687" version="1" comment="libpurple-plugin-skype-lang is &lt;0.0.1.rev624-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093688" version="1" comment="pidgin-plugin-skype is &lt;0.0.1.rev624-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093689" version="1" comment="skype4pidgin is &lt;0.0.1.rev624-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093690" version="1" comment="telepathy-haze is &lt;0.6.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093295" version="1" comment="kernel-debug is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093296" version="1" comment="kernel-debug-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093297" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093298" version="1" comment="kernel-default is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093299" version="1" comment="kernel-default-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093300" version="1" comment="kernel-default-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093301" version="1" comment="kernel-desktop is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093302" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093303" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093304" version="1" comment="kernel-docs is &lt;3.7.10-1.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093305" version="1" comment="kernel-ec2 is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093306" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093307" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093308" version="1" comment="kernel-pae is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093309" version="1" comment="kernel-pae-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093310" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093311" version="1" comment="kernel-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093312" version="1" comment="kernel-source is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093313" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093314" version="1" comment="kernel-syms is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093315" version="1" comment="kernel-trace is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093316" version="1" comment="kernel-trace-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093317" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093318" version="1" comment="kernel-vanilla is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093319" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093320" version="1" comment="kernel-xen is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093321" version="1" comment="kernel-xen-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093322" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093396" version="1" comment="MozillaFirefox is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093397" version="1" comment="MozillaFirefox-branding-upstream is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093398" version="1" comment="MozillaFirefox-buildsymbols is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093399" version="1" comment="MozillaFirefox-devel is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093400" version="1" comment="MozillaFirefox-translations-common is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093401" version="1" comment="MozillaFirefox-translations-other is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093402" version="1" comment="MozillaThunderbird is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093403" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093404" version="1" comment="MozillaThunderbird-devel is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093405" version="1" comment="MozillaThunderbird-translations-common is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093406" version="1" comment="MozillaThunderbird-translations-other is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093407" version="1" comment="enigmail is &lt;1.6.0+24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093408" version="1" comment="libfreebl3 is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093409" version="1" comment="libfreebl3-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093410" version="1" comment="libsoftokn3 is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093411" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093412" version="1" comment="mozilla-nss is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093413" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093414" version="1" comment="mozilla-nss-certs is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093415" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093416" version="1" comment="mozilla-nss-devel is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093417" version="1" comment="mozilla-nss-sysinit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093418" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093419" version="1" comment="mozilla-nss-tools is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093420" version="1" comment="seamonkey is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093421" version="1" comment="seamonkey-dom-inspector is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093422" version="1" comment="seamonkey-irc is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093423" version="1" comment="seamonkey-translations-common is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093424" version="1" comment="seamonkey-translations-other is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093425" version="1" comment="seamonkey-venkman is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093503" version="1" comment="chromedriver is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093504" version="1" comment="chromium is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093505" version="1" comment="chromium-desktop-gnome is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093506" version="1" comment="chromium-desktop-kde is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093507" version="1" comment="chromium-ffmpegsumo is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093508" version="1" comment="chromium-suid-helper is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093620" version="1" comment="curl is &lt;7.28.1-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093621" version="1" comment="libcurl-devel is &lt;7.28.1-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093622" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093623" version="1" comment="libcurl4 is &lt;7.28.1-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093545" version="1" comment="libyaml-0-2 is &lt;0.1.3-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093546" version="1" comment="libyaml is &lt;0.1.3-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093547" version="1" comment="libyaml-devel is &lt;0.1.3-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093548" version="1" comment="libvirt is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093549" version="1" comment="libvirt-client is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093550" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093551" version="1" comment="libvirt-devel is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093552" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093553" version="1" comment="libvirt-doc is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093554" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093555" version="1" comment="libvirt-python is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093556" version="1" comment="mumble is &lt;1.2.5-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093557" version="1" comment="mumble-32bit is &lt;1.2.5-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093558" version="1" comment="mumble-server is &lt;1.2.5-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093559" version="1" comment="icinga is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093560" version="1" comment="icinga-devel is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093561" version="1" comment="icinga-doc is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093562" version="1" comment="icinga-idoutils is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093563" version="1" comment="icinga-idoutils-mysql is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093564" version="1" comment="icinga-idoutils-oracle is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093565" version="1" comment="icinga-idoutils-pgsql is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093566" version="1" comment="icinga-plugins-downtimes is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093567" version="1" comment="icinga-plugins-eventhandlers is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093568" version="1" comment="icinga-www is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093569" version="1" comment="monitoring-tools is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093691" version="1" comment="icedtea-web is &lt;1.4.2-4.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093692" version="1" comment="icedtea-web-javadoc is &lt;1.4.2-4.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093970" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093971" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093972" version="1" comment="subversion is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093973" version="1" comment="subversion-bash-completion is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093974" version="1" comment="subversion-devel is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093975" version="1" comment="subversion-perl is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093976" version="1" comment="subversion-python is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093977" version="1" comment="subversion-server is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093978" version="1" comment="subversion-tools is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093693" version="1" comment="python-logilab-common is &lt;0.58.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093694" version="1" comment="python3-logilab-common is &lt;0.58.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093637" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093638" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093940" version="1" comment="chromedriver is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093941" version="1" comment="chromium is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093942" version="1" comment="chromium-desktop-gnome is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093943" version="1" comment="chromium-desktop-kde is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093944" version="1" comment="chromium-ffmpegsumo is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093945" version="1" comment="chromium-suid-helper is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093979" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093980" version="1" comment="rubygem-actionmailer-3_2-doc is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093981" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093982" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093983" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093984" version="1" comment="rubygem-activerecord-3_2-doc is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093985" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093986" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094648" version="1" comment="xen is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094649" version="1" comment="xen-devel is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094650" version="1" comment="xen-kmp-default is &lt;4.2.4_02_k3.7.10_1.28-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094651" version="1" comment="xen-kmp-desktop is &lt;4.2.4_02_k3.7.10_1.28-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094652" version="1" comment="xen-kmp-pae is &lt;4.2.4_02_k3.7.10_1.28-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094653" version="1" comment="xen-libs-32bit is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094654" version="1" comment="xen-libs is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094655" version="1" comment="xen-tools-domU is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094656" version="1" comment="xen-doc-html is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094657" version="1" comment="xen-doc-pdf is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094658" version="1" comment="xen-tools is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094013" version="1" comment="phpMyAdmin is &lt;4.1.8-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094014" version="1" comment="freeradius-server is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094015" version="1" comment="freeradius-server-devel is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094016" version="1" comment="freeradius-server-dialupadmin is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094017" version="1" comment="freeradius-server-doc is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094018" version="1" comment="freeradius-server-libs is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094019" version="1" comment="freeradius-server-utils is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094020" version="1" comment="libecpg6-32bit is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094021" version="1" comment="libecpg6 is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094022" version="1" comment="libpq5-32bit is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094023" version="1" comment="libpq5 is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094024" version="1" comment="postgresql92-devel is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094025" version="1" comment="postgresql92-libs is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094026" version="1" comment="postgresql92 is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094027" version="1" comment="postgresql92-contrib is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094028" version="1" comment="postgresql92-docs is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094029" version="1" comment="postgresql92-plperl is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094030" version="1" comment="postgresql92-plpython is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094031" version="1" comment="postgresql92-pltcl is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094032" version="1" comment="postgresql92-server is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094033" version="1" comment="fail2ban is &lt;0.8.12-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093946" version="1" comment="gnutls is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093947" version="1" comment="libgnutls-devel is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093948" version="1" comment="libgnutls-devel-32bit is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093949" version="1" comment="libgnutls-openssl-devel is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093950" version="1" comment="libgnutls-openssl27 is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093951" version="1" comment="libgnutls28 is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093952" version="1" comment="libgnutls28-32bit is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093953" version="1" comment="libgnutlsxx-devel is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093954" version="1" comment="libgnutlsxx28 is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094178" version="1" comment="file is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094179" version="1" comment="file-devel is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094180" version="1" comment="libmagic-data is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094181" version="1" comment="libmagic1-32bit is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094182" version="1" comment="libmagic1 is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094183" version="1" comment="python-magic is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094428" version="1" comment="php5-pear-Net_IDNA2 is &lt;0.1.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094429" version="1" comment="roundcubemail is &lt;0.9.5-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094359" version="1" comment="libssh is &lt;0.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094360" version="1" comment="libssh-devel is &lt;0.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094361" version="1" comment="libssh-devel-doc is &lt;0.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094362" version="1" comment="libssh4 is &lt;0.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094116" version="1" comment="otrs is &lt;3.1.20-26.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094117" version="1" comment="otrs-doc is &lt;3.1.20-26.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094118" version="1" comment="otrs-itsm is &lt;3.1.10-26.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094119" version="1" comment="percona-toolkit is &lt;2.1.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094363" version="1" comment="ImageMagick is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094364" version="1" comment="ImageMagick-devel-32bit is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094365" version="1" comment="ImageMagick-devel is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094366" version="1" comment="ImageMagick-doc is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094367" version="1" comment="ImageMagick-extra is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094368" version="1" comment="libMagick++-devel is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094369" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094370" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094371" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094372" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094373" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094374" version="1" comment="perl-PerlMagick is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094184" version="1" comment="wireshark is &lt;1.8.13-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094185" version="1" comment="wireshark-devel is &lt;1.8.13-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094186" version="1" comment="libyaml-0-2 is &lt;0.1.3-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094187" version="1" comment="libyaml is &lt;0.1.3-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094188" version="1" comment="libyaml-devel is &lt;0.1.3-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094189" version="1" comment="udisks is &lt;1.0.4-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094190" version="1" comment="udisks-devel is &lt;1.0.4-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094191" version="1" comment="libudisks2-0 is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094192" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094193" version="1" comment="udisks2 is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094194" version="1" comment="udisks2-devel is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094195" version="1" comment="udisks2-lang is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094229" version="1" comment="libsnmp30-32bit is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094230" version="1" comment="libsnmp30 is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094231" version="1" comment="net-snmp is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094232" version="1" comment="net-snmp-devel-32bit is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094233" version="1" comment="net-snmp-devel is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094234" version="1" comment="perl-SNMP is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094235" version="1" comment="snmp-mibs is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094236" version="1" comment="libjansson is &lt;2.3.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094237" version="1" comment="libjansson-devel is &lt;2.3.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094238" version="1" comment="libjansson4 is &lt;2.3.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094251" version="1" comment="samba-doc is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094252" version="1" comment="libnetapi-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094253" version="1" comment="libnetapi0 is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094254" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094255" version="1" comment="libsmbclient0 is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094256" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094257" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094258" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094259" version="1" comment="libwbclient-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094260" version="1" comment="libwbclient0 is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094261" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094262" version="1" comment="samba is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094263" version="1" comment="samba-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094264" version="1" comment="samba-client is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094265" version="1" comment="samba-client-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094266" version="1" comment="samba-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094267" version="1" comment="samba-krb-printing is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094268" version="1" comment="samba-winbind is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094269" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094430" version="1" comment="icinga is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094431" version="1" comment="icinga-devel is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094432" version="1" comment="icinga-doc is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094433" version="1" comment="icinga-idoutils is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094434" version="1" comment="icinga-idoutils-mysql is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094435" version="1" comment="icinga-idoutils-oracle is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094436" version="1" comment="icinga-idoutils-pgsql is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094437" version="1" comment="icinga-plugins-downtimes is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094438" version="1" comment="icinga-plugins-eventhandlers is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094439" version="1" comment="icinga-www is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094440" version="1" comment="monitoring-tools is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094469" version="1" comment="perl-HTTP-Body is &lt;1.19-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094470" version="1" comment="mutt is &lt;1.5.21-36.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094471" version="1" comment="file is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094472" version="1" comment="file-devel is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094473" version="1" comment="libmagic-data is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094474" version="1" comment="libmagic1-32bit is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094475" version="1" comment="libmagic1 is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094476" version="1" comment="python-magic is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094485" version="1" comment="lighttpd is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094486" version="1" comment="lighttpd-mod_cml is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094487" version="1" comment="lighttpd-mod_geoip is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094488" version="1" comment="lighttpd-mod_magnet is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094489" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094490" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094491" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094492" version="1" comment="lighttpd-mod_webdav is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094493" version="1" comment="MozillaFirefox is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094494" version="1" comment="MozillaFirefox-branding-upstream is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094495" version="1" comment="MozillaFirefox-buildsymbols is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094496" version="1" comment="MozillaFirefox-devel is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094497" version="1" comment="MozillaFirefox-translations-common is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094498" version="1" comment="MozillaFirefox-translations-other is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094499" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094500" version="1" comment="mozilla-nspr is &lt;4.10.4-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094501" version="1" comment="mozilla-nspr-devel is &lt;4.10.4-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094502" version="1" comment="libfreebl3 is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094503" version="1" comment="libfreebl3-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094504" version="1" comment="libsoftokn3 is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094505" version="1" comment="libsoftokn3-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094506" version="1" comment="mozilla-nss is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094507" version="1" comment="mozilla-nss-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094508" version="1" comment="mozilla-nss-certs is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094509" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094510" version="1" comment="mozilla-nss-devel is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094511" version="1" comment="mozilla-nss-sysinit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094512" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094513" version="1" comment="mozilla-nss-tools is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094659" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094660" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094661" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094662" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094663" version="1" comment="openssl is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094664" version="1" comment="openssl-doc is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094665" version="1" comment="file is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094666" version="1" comment="file-devel is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094667" version="1" comment="libmagic-data is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094668" version="1" comment="libmagic1-32bit is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094669" version="1" comment="libmagic1 is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094670" version="1" comment="python-magic is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094853" version="1" comment="chromedriver is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094854" version="1" comment="chromium is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094855" version="1" comment="chromium-desktop-gnome is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094856" version="1" comment="chromium-desktop-kde is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094857" version="1" comment="chromium-ffmpegsumo is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094858" version="1" comment="chromium-suid-helper is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095307" version="1" comment="MozillaThunderbird is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095308" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095309" version="1" comment="MozillaThunderbird-devel is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095310" version="1" comment="MozillaThunderbird-translations-common is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095311" version="1" comment="MozillaThunderbird-translations-other is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095312" version="1" comment="enigmail is &lt;1.6.0+24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095313" version="1" comment="seamonkey is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095314" version="1" comment="seamonkey-dom-inspector is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095315" version="1" comment="seamonkey-irc is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095316" version="1" comment="seamonkey-translations-common is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095317" version="1" comment="seamonkey-translations-other is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095318" version="1" comment="seamonkey-venkman is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094859" version="1" comment="libyaml-0-2 is &lt;0.1.3-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094860" version="1" comment="libyaml is &lt;0.1.3-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094861" version="1" comment="libyaml-devel is &lt;0.1.3-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094900" version="1" comment="nagios is &lt;3.5.0-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094901" version="1" comment="nagios-devel is &lt;3.5.0-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094902" version="1" comment="nagios-www is &lt;3.5.0-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094903" version="1" comment="nagios-www-dch is &lt;3.5.0-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094862" version="1" comment="a2ps is &lt;4.13-1353.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094863" version="1" comment="a2ps-devel is &lt;4.13-1353.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094904" version="1" comment="xinetd is &lt;2.3.14-163.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095130" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-114.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095131" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-114.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094905" version="1" comment="rubygem-rack-ssl is &lt;1.3.2-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094906" version="1" comment="rubygem-rack-ssl-doc is &lt;1.3.2-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094907" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094908" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094909" version="1" comment="python-base is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094910" version="1" comment="python-base-32bit is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094911" version="1" comment="python-devel is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094912" version="1" comment="python-xml is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094913" version="1" comment="python-doc is &lt;2.7-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094914" version="1" comment="python-doc-pdf is &lt;2.7-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094915" version="1" comment="python is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094916" version="1" comment="python-32bit is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094917" version="1" comment="python-curses is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094918" version="1" comment="python-demo is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094919" version="1" comment="python-gdbm is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094920" version="1" comment="python-idle is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094921" version="1" comment="python-tk is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095132" version="1" comment="otrs is &lt;3.1.21-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095133" version="1" comment="otrs-doc is &lt;3.1.21-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095134" version="1" comment="otrs-itsm is &lt;3.1.10-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094698" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094699" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094700" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094701" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094702" version="1" comment="openssl is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094703" version="1" comment="openssl-doc is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095135" version="1" comment="couchdb is &lt;1.2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095136" version="1" comment="squid is &lt;3.2.11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095331" version="1" comment="curl is &lt;7.28.1-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095332" version="1" comment="libcurl-devel is &lt;7.28.1-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095333" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095334" version="1" comment="libcurl4 is &lt;7.28.1-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095137" version="1" comment="json-c is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095138" version="1" comment="libjson-devel is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095139" version="1" comment="libjson-doc is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095140" version="1" comment="libjson0 is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095141" version="1" comment="libjson0-32bit is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095335" version="1" comment="libpython3_3m1_0 is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095336" version="1" comment="libpython3_3m1_0-32bit is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095337" version="1" comment="python3-base is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095338" version="1" comment="python3-base-32bit is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095339" version="1" comment="python3-devel is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095340" version="1" comment="python3-idle is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095341" version="1" comment="python3-testsuite is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095342" version="1" comment="python3-tools is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095343" version="1" comment="python3-doc is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095344" version="1" comment="python3-doc-pdf is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095345" version="1" comment="python3 is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095346" version="1" comment="python3-32bit is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095347" version="1" comment="python3-curses is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095348" version="1" comment="python3-dbm is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095349" version="1" comment="python3-tk is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095142" version="1" comment="libopenssl-devel is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095143" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095144" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095145" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095146" version="1" comment="openssl is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095147" version="1" comment="openssl-doc is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095350" version="1" comment="chromedriver is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095351" version="1" comment="chromium is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095352" version="1" comment="chromium-desktop-gnome is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095353" version="1" comment="chromium-desktop-kde is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095354" version="1" comment="chromium-ffmpegsumo is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095355" version="1" comment="chromium-suid-helper is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095356" version="1" comment="cacti-spine is &lt;0.8.8b-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095357" version="1" comment="cacti is &lt;0.8.8b-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095358" version="1" comment="libopenssl-devel is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095359" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095360" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095361" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095362" version="1" comment="openssl is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095363" version="1" comment="openssl-doc is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095364" version="1" comment="python-imaging is &lt;1.1.7-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095365" version="1" comment="python-imaging-sane is &lt;1.1.7-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095366" version="1" comment="libmms is &lt;0.6.2-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095367" version="1" comment="libmms-devel is &lt;0.6.2-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095368" version="1" comment="libmms0 is &lt;0.6.2-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095369" version="1" comment="libmms0-32bit is &lt;0.6.2-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095370" version="1" comment="nagios-plugins-nrpe is &lt;2.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095371" version="1" comment="nrpe is &lt;2.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095372" version="1" comment="nrpe-doc is &lt;2.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095493" version="1" comment="libpng15 is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095494" version="1" comment="libpng15-15 is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095495" version="1" comment="libpng15-15-32bit is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095496" version="1" comment="libpng15-compat-devel is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095497" version="1" comment="libpng15-compat-devel-32bit is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095498" version="1" comment="libpng15-devel is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095499" version="1" comment="libpng15-devel-32bit is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095500" version="1" comment="libpng12-0 is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095501" version="1" comment="libpng12-0-32bit is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095502" version="1" comment="libpng12 is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095503" version="1" comment="libpng12-compat-devel is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095504" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095505" version="1" comment="libpng12-devel is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095506" version="1" comment="libpng12-devel-32bit is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095373" version="1" comment="MozillaFirefox is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095374" version="1" comment="MozillaFirefox-branding-upstream is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095375" version="1" comment="MozillaFirefox-buildsymbols is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095376" version="1" comment="MozillaFirefox-devel is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095377" version="1" comment="MozillaFirefox-translations-common is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095378" version="1" comment="MozillaFirefox-translations-other is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095379" version="1" comment="libfreebl3 is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095380" version="1" comment="libfreebl3-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095381" version="1" comment="libsoftokn3 is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095382" version="1" comment="libsoftokn3-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095383" version="1" comment="mozilla-nss is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095384" version="1" comment="mozilla-nss-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095385" version="1" comment="mozilla-nss-certs is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095386" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095387" version="1" comment="mozilla-nss-devel is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095388" version="1" comment="mozilla-nss-sysinit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095389" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095390" version="1" comment="mozilla-nss-tools is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095630" version="1" comment="MozillaThunderbird is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095631" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095632" version="1" comment="MozillaThunderbird-devel is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095633" version="1" comment="MozillaThunderbird-translations-common is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095634" version="1" comment="MozillaThunderbird-translations-other is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095635" version="1" comment="enigmail is &lt;1.6.0+24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095519" version="1" comment="seamonkey is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095520" version="1" comment="seamonkey-dom-inspector is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095521" version="1" comment="seamonkey-irc is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095522" version="1" comment="seamonkey-translations-common is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095523" version="1" comment="seamonkey-translations-other is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095524" version="1" comment="seamonkey-venkman is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095507" version="1" comment="python-eyeD3 is &lt;0.6.18-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095553" version="1" comment="android-tools is &lt;4.2.1_r1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095554" version="1" comment="libopenssl-devel is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095555" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095556" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095557" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095558" version="1" comment="openssl is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095559" version="1" comment="openssl-doc is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095743" version="1" comment="chromedriver is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095744" version="1" comment="chromium is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095745" version="1" comment="chromium-desktop-gnome is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095746" version="1" comment="chromium-desktop-kde is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095747" version="1" comment="chromium-ffmpegsumo is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095748" version="1" comment="chromium-suid-helper is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095652" version="1" comment="libxml2-2 is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095653" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095654" version="1" comment="libxml2 is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095655" version="1" comment="libxml2-devel is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095656" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095657" version="1" comment="libxml2-doc is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095658" version="1" comment="libxml2-tools is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095659" version="1" comment="python-libxml2 is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095660" version="1" comment="libvirt is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095661" version="1" comment="libvirt-client is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095662" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095663" version="1" comment="libvirt-devel is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095664" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095665" version="1" comment="libvirt-doc is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095666" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095667" version="1" comment="libvirt-python is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095780" version="1" comment="kernel-debug is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095781" version="1" comment="kernel-debug-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095782" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095783" version="1" comment="kernel-default is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095784" version="1" comment="kernel-default-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095785" version="1" comment="kernel-default-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095786" version="1" comment="kernel-desktop is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095787" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095788" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095789" version="1" comment="kernel-docs is &lt;3.7.10-1.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095790" version="1" comment="kernel-ec2 is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095791" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095792" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095793" version="1" comment="kernel-pae is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095794" version="1" comment="kernel-pae-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095795" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095796" version="1" comment="kernel-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095797" version="1" comment="kernel-source is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095798" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095799" version="1" comment="kernel-syms is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095800" version="1" comment="kernel-trace is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095801" version="1" comment="kernel-trace-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095802" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095803" version="1" comment="kernel-vanilla is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095804" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095805" version="1" comment="kernel-xen is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095806" version="1" comment="kernel-xen-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095807" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096013" version="1" comment="strongswan is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096014" version="1" comment="strongswan-doc is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096015" version="1" comment="strongswan-ipsec is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096016" version="1" comment="strongswan-libs0 is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096017" version="1" comment="strongswan-mysql is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096018" version="1" comment="strongswan-nm is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096019" version="1" comment="strongswan-sqlite is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096196" version="1" comment="perl-LWP-Protocol-https is &lt;6.03-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096077" version="1" comment="mumble is &lt;1.2.6-21.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096078" version="1" comment="mumble-32bit is &lt;1.2.6-21.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096079" version="1" comment="mumble-server is &lt;1.2.6-21.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096080" version="1" comment="libXfont is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096081" version="1" comment="libXfont-devel is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096082" version="1" comment="libXfont-devel-32bit is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096083" version="1" comment="libXfont1 is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096084" version="1" comment="libXfont1-32bit is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096094" version="1" comment="postfixadmin is &lt;2.3.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096129" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096130" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096131" version="1" comment="tor is &lt;0.2.4.22-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096141" version="1" comment="libcap-ng-python is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096142" version="1" comment="python-capng is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096143" version="1" comment="libcap-ng is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096144" version="1" comment="libcap-ng-devel is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096145" version="1" comment="libcap-ng-utils is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096146" version="1" comment="libcap-ng0 is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096147" version="1" comment="libcap-ng0-32bit is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096132" version="1" comment="libgadu is &lt;1.11.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096133" version="1" comment="libgadu-devel is &lt;1.11.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096134" version="1" comment="libgadu3 is &lt;1.11.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096148" version="1" comment="python-lxml is &lt;2.3.4-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096149" version="1" comment="python-lxml-doc is &lt;2.3.4-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096150" version="1" comment="python3-lxml is &lt;2.3.4-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096151" version="1" comment="python3-lxml-doc is &lt;2.3.4-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096095" version="1" comment="libxml2-2 is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096096" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096097" version="1" comment="libxml2 is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096098" version="1" comment="libxml2-devel is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096099" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096100" version="1" comment="libxml2-doc is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096101" version="1" comment="libxml2-tools is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096102" version="1" comment="python-libxml2 is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096494" version="1" comment="chromedriver is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096495" version="1" comment="chromium is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096496" version="1" comment="chromium-desktop-gnome is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096497" version="1" comment="chromium-desktop-kde is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096498" version="1" comment="chromium-ffmpegsumo is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096499" version="1" comment="chromium-suid-helper is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096500" version="1" comment="ninja is &lt;3.0+git.20130603.0f53fd3-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096501" version="1" comment="apache2-mod_wsgi is &lt;3.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096502" version="1" comment="apache2-mod_wsgi is &lt;3.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096198" version="1" comment="libxml2-2 is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096199" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096200" version="1" comment="libxml2 is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096201" version="1" comment="libxml2-devel is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096202" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096203" version="1" comment="libxml2-doc is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096204" version="1" comment="libxml2-tools is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096205" version="1" comment="python-libxml2 is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096337" version="1" comment="gnutls is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096338" version="1" comment="libgnutls-devel is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096339" version="1" comment="libgnutls-devel-32bit is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096340" version="1" comment="libgnutls-openssl-devel is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096341" version="1" comment="libgnutls-openssl27 is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096342" version="1" comment="libgnutls28 is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096343" version="1" comment="libgnutls28-32bit is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096344" version="1" comment="libgnutlsxx-devel is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096345" version="1" comment="libgnutlsxx28 is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096503" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096504" version="1" comment="php5 is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096505" version="1" comment="php5-bcmath is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096506" version="1" comment="php5-bz2 is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096507" version="1" comment="php5-calendar is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096508" version="1" comment="php5-ctype is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096509" version="1" comment="php5-curl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096510" version="1" comment="php5-dba is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096511" version="1" comment="php5-devel is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096512" version="1" comment="php5-dom is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096513" version="1" comment="php5-enchant is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096514" version="1" comment="php5-exif is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096515" version="1" comment="php5-fastcgi is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096516" version="1" comment="php5-fileinfo is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096517" version="1" comment="php5-fpm is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096518" version="1" comment="php5-ftp is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096519" version="1" comment="php5-gd is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096520" version="1" comment="php5-gettext is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096521" version="1" comment="php5-gmp is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096522" version="1" comment="php5-iconv is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096523" version="1" comment="php5-imap is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096524" version="1" comment="php5-intl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096525" version="1" comment="php5-json is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096526" version="1" comment="php5-ldap is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096527" version="1" comment="php5-mbstring is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096528" version="1" comment="php5-mcrypt is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096529" version="1" comment="php5-mssql is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096530" version="1" comment="php5-mysql is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096531" version="1" comment="php5-odbc is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096532" version="1" comment="php5-openssl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096533" version="1" comment="php5-pcntl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096534" version="1" comment="php5-pdo is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096535" version="1" comment="php5-pear is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096536" version="1" comment="php5-pgsql is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096537" version="1" comment="php5-phar is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096538" version="1" comment="php5-posix is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096539" version="1" comment="php5-pspell is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096540" version="1" comment="php5-readline is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096541" version="1" comment="php5-shmop is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096542" version="1" comment="php5-snmp is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096543" version="1" comment="php5-soap is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096544" version="1" comment="php5-sockets is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096545" version="1" comment="php5-sqlite is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096546" version="1" comment="php5-suhosin is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096547" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096548" version="1" comment="php5-sysvsem is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096549" version="1" comment="php5-sysvshm is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096550" version="1" comment="php5-tidy is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096551" version="1" comment="php5-tokenizer is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096552" version="1" comment="php5-wddx is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096553" version="1" comment="php5-xmlreader is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096554" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096555" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096556" version="1" comment="php5-xsl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096557" version="1" comment="php5-zip is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096558" version="1" comment="php5-zlib is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096346" version="1" comment="libopenssl-devel is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096347" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096348" version="1" comment="libopenssl1_0_0 is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096349" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096350" version="1" comment="openssl is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096351" version="1" comment="openssl-doc is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096676" version="1" comment="rmail is &lt;8.14.3-85.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096677" version="1" comment="sendmail is &lt;8.14.5-85.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096678" version="1" comment="sendmail-devel is &lt;8.14.5-85.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096679" version="1" comment="uucp is &lt;1.07-85.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096690" version="1" comment="typo3-cms-4_5 is &lt;4.5.34-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096691" version="1" comment="rxvt-unicode is &lt;9.15-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096692" version="1" comment="libminiupnpc-devel is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096693" version="1" comment="libminiupnpc10 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096694" version="1" comment="miniupnpc is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096695" version="1" comment="python-miniupnpc is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096761" version="1" comment="MozillaFirefox is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096762" version="1" comment="MozillaFirefox-branding-upstream is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096763" version="1" comment="MozillaFirefox-buildsymbols is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096764" version="1" comment="MozillaFirefox-devel is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096765" version="1" comment="MozillaFirefox-translations-common is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096766" version="1" comment="MozillaFirefox-translations-other is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096767" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096768" version="1" comment="mozilla-nspr is &lt;4.10.6-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096769" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096770" version="1" comment="libfreebl3 is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096771" version="1" comment="libfreebl3-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096772" version="1" comment="libsoftokn3 is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096773" version="1" comment="libsoftokn3-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096774" version="1" comment="mozilla-nss is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096775" version="1" comment="mozilla-nss-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096776" version="1" comment="mozilla-nss-certs is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096777" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096778" version="1" comment="mozilla-nss-devel is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096779" version="1" comment="mozilla-nss-sysinit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096780" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096781" version="1" comment="mozilla-nss-tools is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097165" version="1" comment="MozillaThunderbird is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097166" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097167" version="1" comment="MozillaThunderbird-devel is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097168" version="1" comment="MozillaThunderbird-translations-common is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097169" version="1" comment="MozillaThunderbird-translations-other is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097170" version="1" comment="enigmail is &lt;1.6.0+24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096782" version="1" comment="dbus-1-x11 is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096783" version="1" comment="dbus-1 is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096784" version="1" comment="dbus-1-32bit is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096785" version="1" comment="dbus-1-devel is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096786" version="1" comment="dbus-1-devel-32bit is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096787" version="1" comment="dbus-1-devel-doc is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096788" version="1" comment="libdbus-1-3 is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096789" version="1" comment="libdbus-1-3-32bit is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096913" version="1" comment="ctdb is &lt;2.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096914" version="1" comment="ctdb-devel is &lt;2.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096915" version="1" comment="ctdb-pcp-pmda is &lt;2.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096790" version="1" comment="castor is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096791" version="1" comment="castor-demo is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096792" version="1" comment="castor-doc is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096793" version="1" comment="castor-javadoc is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096794" version="1" comment="castor-test is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096795" version="1" comment="castor-xml is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097171" version="1" comment="kernel-debug is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097172" version="1" comment="kernel-debug-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097173" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097174" version="1" comment="kernel-default is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097175" version="1" comment="kernel-default-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097176" version="1" comment="kernel-default-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097177" version="1" comment="kernel-desktop is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097178" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097179" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097180" version="1" comment="kernel-docs is &lt;3.7.10-1.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097181" version="1" comment="kernel-ec2 is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097182" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097183" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097184" version="1" comment="kernel-pae is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097185" version="1" comment="kernel-pae-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097186" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097187" version="1" comment="kernel-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097188" version="1" comment="kernel-source is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097189" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097190" version="1" comment="kernel-syms is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097191" version="1" comment="kernel-trace is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097192" version="1" comment="kernel-trace-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097193" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097194" version="1" comment="kernel-vanilla is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097195" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097196" version="1" comment="kernel-xen is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097197" version="1" comment="kernel-xen-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097198" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097199" version="1" comment="seamonkey is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097200" version="1" comment="seamonkey-dom-inspector is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097201" version="1" comment="seamonkey-irc is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097202" version="1" comment="seamonkey-translations-common is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097203" version="1" comment="seamonkey-translations-other is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097204" version="1" comment="seamonkey-venkman is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096916" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096917" version="1" comment="php5 is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096918" version="1" comment="php5-bcmath is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096919" version="1" comment="php5-bz2 is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096920" version="1" comment="php5-calendar is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096921" version="1" comment="php5-ctype is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096922" version="1" comment="php5-curl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096923" version="1" comment="php5-dba is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096924" version="1" comment="php5-devel is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096925" version="1" comment="php5-dom is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096926" version="1" comment="php5-enchant is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096927" version="1" comment="php5-exif is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096928" version="1" comment="php5-fastcgi is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096929" version="1" comment="php5-fileinfo is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096930" version="1" comment="php5-fpm is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096931" version="1" comment="php5-ftp is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096932" version="1" comment="php5-gd is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096933" version="1" comment="php5-gettext is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096934" version="1" comment="php5-gmp is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096935" version="1" comment="php5-iconv is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096936" version="1" comment="php5-imap is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096937" version="1" comment="php5-intl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096938" version="1" comment="php5-json is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096939" version="1" comment="php5-ldap is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096940" version="1" comment="php5-mbstring is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096941" version="1" comment="php5-mcrypt is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096942" version="1" comment="php5-mssql is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096943" version="1" comment="php5-mysql is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096944" version="1" comment="php5-odbc is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096945" version="1" comment="php5-openssl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096946" version="1" comment="php5-pcntl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096947" version="1" comment="php5-pdo is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096948" version="1" comment="php5-pear is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096949" version="1" comment="php5-pgsql is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096950" version="1" comment="php5-phar is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096951" version="1" comment="php5-posix is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096952" version="1" comment="php5-pspell is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096953" version="1" comment="php5-readline is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096954" version="1" comment="php5-shmop is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096955" version="1" comment="php5-snmp is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096956" version="1" comment="php5-soap is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096957" version="1" comment="php5-sockets is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096958" version="1" comment="php5-sqlite is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096959" version="1" comment="php5-suhosin is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096960" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096961" version="1" comment="php5-sysvsem is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096962" version="1" comment="php5-sysvshm is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096963" version="1" comment="php5-tidy is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096964" version="1" comment="php5-tokenizer is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096965" version="1" comment="php5-wddx is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096966" version="1" comment="php5-xmlreader is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096967" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096968" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096969" version="1" comment="php5-xsl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096970" version="1" comment="php5-zip is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096971" version="1" comment="php5-zlib is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097205" version="1" comment="xalan-j2 is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097206" version="1" comment="xalan-j2-demo is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097207" version="1" comment="xalan-j2-javadoc is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097208" version="1" comment="xalan-j2-manual is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097209" version="1" comment="xalan-j2-xsltc is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097210" version="1" comment="samba-doc is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097211" version="1" comment="libnetapi-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097212" version="1" comment="libnetapi0 is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097213" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097214" version="1" comment="libsmbclient0 is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097215" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097216" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097217" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097218" version="1" comment="libwbclient-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097219" version="1" comment="libwbclient0 is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097220" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097221" version="1" comment="samba is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097222" version="1" comment="samba-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097223" version="1" comment="samba-client is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097224" version="1" comment="samba-client-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097225" version="1" comment="samba-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097226" version="1" comment="samba-krb-printing is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097227" version="1" comment="samba-winbind is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097228" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097229" version="1" comment="freerdp is &lt;1.0.2-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097230" version="1" comment="freerdp-devel is &lt;1.0.2-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097231" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097232" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097488" version="1" comment="memcached is &lt;1.4.20-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097489" version="1" comment="gpg2 is &lt;2.0.19-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097490" version="1" comment="gpg2-lang is &lt;2.0.19-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097806" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097807" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097808" version="1" comment="python-base is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097809" version="1" comment="python-base-32bit is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097810" version="1" comment="python-devel is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097811" version="1" comment="python-xml is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097812" version="1" comment="python-doc is &lt;2.7-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097813" version="1" comment="python-doc-pdf is &lt;2.7-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097814" version="1" comment="python is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097815" version="1" comment="python-32bit is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097816" version="1" comment="python-curses is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097817" version="1" comment="python-demo is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097818" version="1" comment="python-gdbm is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097819" version="1" comment="python-idle is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097820" version="1" comment="python-tk is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097821" version="1" comment="libpython3_3m1_0 is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097822" version="1" comment="libpython3_3m1_0-32bit is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097823" version="1" comment="python3-base is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097824" version="1" comment="python3-base-32bit is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097825" version="1" comment="python3-devel is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097826" version="1" comment="python3-idle is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097827" version="1" comment="python3-testsuite is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097828" version="1" comment="python3-tools is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097829" version="1" comment="python3-doc is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097830" version="1" comment="python3-doc-pdf is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097831" version="1" comment="python3 is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097832" version="1" comment="python3-32bit is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097833" version="1" comment="python3-curses is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097834" version="1" comment="python3-dbm is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097835" version="1" comment="python3-tk is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098175" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098176" version="1" comment="php5 is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098177" version="1" comment="php5-bcmath is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098178" version="1" comment="php5-bz2 is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098179" version="1" comment="php5-calendar is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098180" version="1" comment="php5-ctype is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098181" version="1" comment="php5-curl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098182" version="1" comment="php5-dba is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098183" version="1" comment="php5-devel is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098184" version="1" comment="php5-dom is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098185" version="1" comment="php5-enchant is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098186" version="1" comment="php5-exif is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098187" version="1" comment="php5-fastcgi is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098188" version="1" comment="php5-fileinfo is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098189" version="1" comment="php5-fpm is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098190" version="1" comment="php5-ftp is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098191" version="1" comment="php5-gd is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098192" version="1" comment="php5-gettext is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098193" version="1" comment="php5-gmp is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098194" version="1" comment="php5-iconv is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098195" version="1" comment="php5-imap is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098196" version="1" comment="php5-intl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098197" version="1" comment="php5-json is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098198" version="1" comment="php5-ldap is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098199" version="1" comment="php5-mbstring is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098200" version="1" comment="php5-mcrypt is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098201" version="1" comment="php5-mssql is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098202" version="1" comment="php5-mysql is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098203" version="1" comment="php5-odbc is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098204" version="1" comment="php5-openssl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098205" version="1" comment="php5-pcntl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098206" version="1" comment="php5-pdo is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098207" version="1" comment="php5-pear is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098208" version="1" comment="php5-pgsql is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098209" version="1" comment="php5-phar is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098210" version="1" comment="php5-posix is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098211" version="1" comment="php5-pspell is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098212" version="1" comment="php5-readline is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098213" version="1" comment="php5-shmop is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098214" version="1" comment="php5-snmp is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098215" version="1" comment="php5-soap is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098216" version="1" comment="php5-sockets is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098217" version="1" comment="php5-sqlite is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098218" version="1" comment="php5-suhosin is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098219" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098220" version="1" comment="php5-sysvsem is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098221" version="1" comment="php5-sysvshm is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098222" version="1" comment="php5-tidy is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098223" version="1" comment="php5-tokenizer is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098224" version="1" comment="php5-wddx is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098225" version="1" comment="php5-xmlreader is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098226" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098227" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098228" version="1" comment="php5-xsl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098229" version="1" comment="php5-zip is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098230" version="1" comment="php5-zlib is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098231" version="1" comment="liblzo2-2 is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098232" version="1" comment="liblzo2-2-32bit is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098233" version="1" comment="lzo is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098234" version="1" comment="lzo-devel is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098235" version="1" comment="lzo-devel-32bit is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098236" version="1" comment="dbus-1-x11 is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098237" version="1" comment="dbus-1 is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098238" version="1" comment="dbus-1-32bit is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098239" version="1" comment="dbus-1-devel is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098240" version="1" comment="dbus-1-devel-32bit is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098241" version="1" comment="dbus-1-devel-doc is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098242" version="1" comment="libdbus-1-3 is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098243" version="1" comment="libdbus-1-3-32bit is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098244" version="1" comment="eet is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098245" version="1" comment="eet-devel is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098246" version="1" comment="eet-doc-html is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098247" version="1" comment="eet-examples is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098248" version="1" comment="libeet1 is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099056" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099057" version="1" comment="php5 is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099058" version="1" comment="php5-bcmath is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099059" version="1" comment="php5-bz2 is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099060" version="1" comment="php5-calendar is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099061" version="1" comment="php5-ctype is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099062" version="1" comment="php5-curl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099063" version="1" comment="php5-dba is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099064" version="1" comment="php5-devel is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099065" version="1" comment="php5-dom is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099066" version="1" comment="php5-enchant is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099067" version="1" comment="php5-exif is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099068" version="1" comment="php5-fastcgi is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099069" version="1" comment="php5-fileinfo is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099070" version="1" comment="php5-fpm is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099071" version="1" comment="php5-ftp is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099072" version="1" comment="php5-gd is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099073" version="1" comment="php5-gettext is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099074" version="1" comment="php5-gmp is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099075" version="1" comment="php5-iconv is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099076" version="1" comment="php5-imap is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099077" version="1" comment="php5-intl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099078" version="1" comment="php5-json is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099079" version="1" comment="php5-ldap is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099080" version="1" comment="php5-mbstring is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099081" version="1" comment="php5-mcrypt is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099082" version="1" comment="php5-mssql is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099083" version="1" comment="php5-mysql is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099084" version="1" comment="php5-odbc is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099085" version="1" comment="php5-openssl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099086" version="1" comment="php5-pcntl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099087" version="1" comment="php5-pdo is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099088" version="1" comment="php5-pear is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099089" version="1" comment="php5-pgsql is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099090" version="1" comment="php5-phar is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099091" version="1" comment="php5-posix is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099092" version="1" comment="php5-pspell is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099093" version="1" comment="php5-readline is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099094" version="1" comment="php5-shmop is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099095" version="1" comment="php5-snmp is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099096" version="1" comment="php5-soap is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099097" version="1" comment="php5-sockets is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099098" version="1" comment="php5-sqlite is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099099" version="1" comment="php5-suhosin is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099100" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099101" version="1" comment="php5-sysvsem is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099102" version="1" comment="php5-sysvshm is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099103" version="1" comment="php5-tidy is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099104" version="1" comment="php5-tokenizer is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099105" version="1" comment="php5-wddx is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099106" version="1" comment="php5-xmlreader is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099107" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099108" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099109" version="1" comment="php5-xsl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099110" version="1" comment="php5-zip is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099111" version="1" comment="php5-zlib is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099112" version="1" comment="ntp is &lt;4.2.6p5-9.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099113" version="1" comment="ntp-doc is &lt;4.2.6p5-9.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099206" version="1" comment="kernel-debug is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099207" version="1" comment="kernel-debug-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099208" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099209" version="1" comment="kernel-default is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099210" version="1" comment="kernel-default-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099211" version="1" comment="kernel-default-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099212" version="1" comment="kernel-desktop is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099213" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099214" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099215" version="1" comment="kernel-docs is &lt;3.7.10-1.40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099216" version="1" comment="kernel-ec2 is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099217" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099218" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099219" version="1" comment="kernel-pae is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099220" version="1" comment="kernel-pae-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099221" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099222" version="1" comment="kernel-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099223" version="1" comment="kernel-source is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099224" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099225" version="1" comment="kernel-syms is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099226" version="1" comment="kernel-trace is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099227" version="1" comment="kernel-trace-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099228" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099229" version="1" comment="kernel-vanilla is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099230" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099231" version="1" comment="kernel-xen is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099232" version="1" comment="kernel-xen-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099233" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098967" version="1" comment="MozillaFirefox is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098968" version="1" comment="MozillaFirefox-branding-upstream is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098969" version="1" comment="MozillaFirefox-buildsymbols is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098970" version="1" comment="MozillaFirefox-devel is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098971" version="1" comment="MozillaFirefox-translations-common is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098972" version="1" comment="MozillaFirefox-translations-other is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098973" version="1" comment="libfreebl3 is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098974" version="1" comment="libfreebl3-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098975" version="1" comment="libsoftokn3 is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098976" version="1" comment="libsoftokn3-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098977" version="1" comment="mozilla-nss is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098978" version="1" comment="mozilla-nss-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098979" version="1" comment="mozilla-nss-certs is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098980" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098981" version="1" comment="mozilla-nss-devel is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098982" version="1" comment="mozilla-nss-sysinit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098983" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098984" version="1" comment="mozilla-nss-tools is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099259" version="1" comment="MozillaThunderbird is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099260" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099261" version="1" comment="MozillaThunderbird-devel is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099262" version="1" comment="MozillaThunderbird-translations-common is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099263" version="1" comment="MozillaThunderbird-translations-other is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099264" version="1" comment="enigmail is &lt;1.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099114" version="1" comment="libpulse-devel is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099115" version="1" comment="libpulse-mainloop-glib0 is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099116" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099117" version="1" comment="libpulse0 is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099118" version="1" comment="libpulse0-32bit is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099119" version="1" comment="pulseaudio is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099120" version="1" comment="pulseaudio-esound-compat is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099121" version="1" comment="pulseaudio-gdm-hooks is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099122" version="1" comment="pulseaudio-lang is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099123" version="1" comment="pulseaudio-module-bluetooth is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099124" version="1" comment="pulseaudio-module-gconf is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099125" version="1" comment="pulseaudio-module-jack is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099126" version="1" comment="pulseaudio-module-lirc is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099127" version="1" comment="pulseaudio-module-x11 is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099128" version="1" comment="pulseaudio-module-zeroconf is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099129" version="1" comment="pulseaudio-utils is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099265" version="1" comment="exim is &lt;4.83-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099266" version="1" comment="eximon is &lt;4.83-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099267" version="1" comment="eximstats-html is &lt;4.83-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099268" version="1" comment="chromedriver is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099269" version="1" comment="chromium is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099270" version="1" comment="chromium-desktop-gnome is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099271" version="1" comment="chromium-desktop-kde is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099272" version="1" comment="chromium-ffmpegsumo is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099273" version="1" comment="chromium-suid-helper is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099274" version="1" comment="krb5-doc is &lt;1.10.2-10.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099275" version="1" comment="krb5-mini is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099276" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099277" version="1" comment="krb5 is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099278" version="1" comment="krb5-32bit is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099279" version="1" comment="krb5-client is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099280" version="1" comment="krb5-devel is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099281" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099282" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099283" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099284" version="1" comment="krb5-server is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099285" version="1" comment="jbigkit is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099286" version="1" comment="libjbig-devel is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099287" version="1" comment="libjbig-devel-32bit is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099288" version="1" comment="libjbig2 is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099289" version="1" comment="libjbig2-32bit is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099290" version="1" comment="elfutils is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099291" version="1" comment="libasm-devel is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099292" version="1" comment="libasm1 is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099293" version="1" comment="libasm1-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099294" version="1" comment="libdw-devel is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099295" version="1" comment="libdw1 is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099296" version="1" comment="libdw1-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099297" version="1" comment="libebl-devel is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099298" version="1" comment="libebl1 is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099299" version="1" comment="libebl1-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099300" version="1" comment="libelf-devel is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099301" version="1" comment="libelf-devel-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099302" version="1" comment="libelf1 is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099303" version="1" comment="libelf1-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099304" version="1" comment="tor is &lt;0.2.4.23-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099588" version="1" comment="apache2-mod_security2 is &lt;2.7.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099589" version="1" comment="apache2 is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099590" version="1" comment="apache2-devel is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099591" version="1" comment="apache2-doc is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099592" version="1" comment="apache2-event is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099593" version="1" comment="apache2-example-pages is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099594" version="1" comment="apache2-itk is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099595" version="1" comment="apache2-prefork is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099596" version="1" comment="apache2-utils is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099597" version="1" comment="apache2-worker is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099598" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099599" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099600" version="1" comment="python-base is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099601" version="1" comment="python-base-32bit is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099602" version="1" comment="python-devel is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099603" version="1" comment="python-xml is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099604" version="1" comment="python-doc is &lt;2.7-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099605" version="1" comment="python-doc-pdf is &lt;2.7-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099606" version="1" comment="python is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099607" version="1" comment="python-32bit is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099608" version="1" comment="python-curses is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099609" version="1" comment="python-demo is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099610" version="1" comment="python-gdbm is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099611" version="1" comment="python-idle is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099612" version="1" comment="python-tk is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099893" version="1" comment="libpython3_3m1_0 is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099894" version="1" comment="libpython3_3m1_0-32bit is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099895" version="1" comment="python3-base is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099896" version="1" comment="python3-base-32bit is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099897" version="1" comment="python3-devel is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099898" version="1" comment="python3-idle is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099899" version="1" comment="python3-testsuite is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099900" version="1" comment="python3-tools is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099901" version="1" comment="python3-doc is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099902" version="1" comment="python3-doc-pdf is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099903" version="1" comment="python3 is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099904" version="1" comment="python3-32bit is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099905" version="1" comment="python3-curses is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099906" version="1" comment="python3-dbm is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099907" version="1" comment="python3-tk is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099613" version="1" comment="gpgme is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099614" version="1" comment="libgpgme-devel is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099615" version="1" comment="libgpgme11 is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099616" version="1" comment="libgpgme11-32bit is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099617" version="1" comment="krb5-doc is &lt;1.10.2-10.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099618" version="1" comment="krb5-mini is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099619" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099620" version="1" comment="krb5 is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099621" version="1" comment="krb5-32bit is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099622" version="1" comment="krb5-client is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099623" version="1" comment="krb5-devel is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099624" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099625" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099626" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099627" version="1" comment="krb5-server is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099804" version="1" comment="libopenssl-devel is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099805" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099806" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099807" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099808" version="1" comment="openssl is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099809" version="1" comment="openssl-doc is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099851" version="1" comment="libserf-1-0 is &lt;1.1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099852" version="1" comment="libserf is &lt;1.1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099853" version="1" comment="libserf-devel is &lt;1.1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099854" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099855" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099856" version="1" comment="subversion is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099857" version="1" comment="subversion-bash-completion is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099858" version="1" comment="subversion-devel is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099859" version="1" comment="subversion-perl is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099860" version="1" comment="subversion-python is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099861" version="1" comment="subversion-server is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099862" version="1" comment="subversion-tools is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099863" version="1" comment="IPython is &lt;0.13.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099864" version="1" comment="IPython-doc is &lt;0.13.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099865" version="1" comment="python3-IPython is &lt;0.13.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099866" version="1" comment="libgcrypt is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099867" version="1" comment="libgcrypt-devel is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099868" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099869" version="1" comment="libgcrypt11 is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099870" version="1" comment="libgcrypt11-32bit is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099908" version="1" comment="phpMyAdmin is &lt;4.1.14.3-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100031" version="1" comment="glibc-testsuite is &lt;2.17-4.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100032" version="1" comment="glibc-utils is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100033" version="1" comment="glibc-utils-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100034" version="1" comment="glibc is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100035" version="1" comment="glibc-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100036" version="1" comment="glibc-devel is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100037" version="1" comment="glibc-devel-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100038" version="1" comment="glibc-devel-static is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100039" version="1" comment="glibc-devel-static-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100040" version="1" comment="glibc-extra is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100041" version="1" comment="glibc-i18ndata is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100042" version="1" comment="glibc-info is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100043" version="1" comment="glibc-locale is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100044" version="1" comment="glibc-locale-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100045" version="1" comment="glibc-obsolete is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100046" version="1" comment="glibc-profile is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100047" version="1" comment="glibc-profile-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100048" version="1" comment="nscd is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100049" version="1" comment="glibc-html is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099943" version="1" comment="enigmail is &lt;1.7.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100165" version="1" comment="libreoffice-branding-upstream is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100166" version="1" comment="libreoffice-help-en-US is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100167" version="1" comment="libreoffice-help-ast is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100168" version="1" comment="libreoffice-help-bg is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100169" version="1" comment="libreoffice-help-ca is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100170" version="1" comment="libreoffice-help-cs is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100171" version="1" comment="libreoffice-help-da is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100172" version="1" comment="libreoffice-help-de is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100173" version="1" comment="libreoffice-help-en-GB is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100174" version="1" comment="libreoffice-help-group1 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100175" version="1" comment="libreoffice-help-el is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100176" version="1" comment="libreoffice-help-en-ZA is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100177" version="1" comment="libreoffice-help-es is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100178" version="1" comment="libreoffice-help-et is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100179" version="1" comment="libreoffice-help-eu is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100180" version="1" comment="libreoffice-help-fi is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100181" version="1" comment="libreoffice-help-fr is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100182" version="1" comment="libreoffice-help-group2 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100183" version="1" comment="libreoffice-help-gl is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100184" version="1" comment="libreoffice-help-group3 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100185" version="1" comment="libreoffice-help-gu-IN is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100186" version="1" comment="libreoffice-help-hi-IN is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100187" version="1" comment="libreoffice-help-hu is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100188" version="1" comment="libreoffice-help-it is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100189" version="1" comment="libreoffice-help-ja is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100190" version="1" comment="libreoffice-help-km is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100191" version="1" comment="libreoffice-help-group4 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100192" version="1" comment="libreoffice-help-ko is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100193" version="1" comment="libreoffice-help-mk is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100194" version="1" comment="libreoffice-help-nb is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100195" version="1" comment="libreoffice-help-nl is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100196" version="1" comment="libreoffice-help-pl is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100197" version="1" comment="libreoffice-help-pt is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100198" version="1" comment="libreoffice-help-pt-BR is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100199" version="1" comment="libreoffice-help-group5 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100200" version="1" comment="libreoffice-help-ru is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100201" version="1" comment="libreoffice-help-sk is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100202" version="1" comment="libreoffice-help-sl is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100203" version="1" comment="libreoffice-help-sv is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100204" version="1" comment="libreoffice-help-tr is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100205" version="1" comment="libreoffice-help-vi is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100206" version="1" comment="libreoffice-help-zh-CN is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100207" version="1" comment="libreoffice-help-zh-TW is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100208" version="1" comment="libreoffice-icon-theme-crystal is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100209" version="1" comment="libreoffice-icon-theme-galaxy is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100210" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100211" version="1" comment="libreoffice-icon-theme-oxygen is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100212" version="1" comment="libreoffice-icon-theme-tango is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100213" version="1" comment="libreoffice-icon-themes is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100214" version="1" comment="libreoffice-l10n is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100215" version="1" comment="libreoffice-l10n-af is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100216" version="1" comment="libreoffice-l10n-am is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100217" version="1" comment="libreoffice-l10n-ar is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100218" version="1" comment="libreoffice-l10n-as is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100219" version="1" comment="libreoffice-l10n-ast is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100220" version="1" comment="libreoffice-l10n-be-BY is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100221" version="1" comment="libreoffice-l10n-bg is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100222" version="1" comment="libreoffice-l10n-br is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100223" version="1" comment="libreoffice-l10n-ca is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100224" version="1" comment="libreoffice-l10n-cs is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100225" version="1" comment="libreoffice-l10n-cy is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100226" version="1" comment="libreoffice-l10n-da is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100227" version="1" comment="libreoffice-l10n-de is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100228" version="1" comment="libreoffice-l10n-el is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100229" version="1" comment="libreoffice-l10n-en-GB is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100230" version="1" comment="libreoffice-l10n-en-ZA is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100231" version="1" comment="libreoffice-l10n-eo is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100232" version="1" comment="libreoffice-l10n-es is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100233" version="1" comment="libreoffice-l10n-et is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100234" version="1" comment="libreoffice-l10n-eu is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100235" version="1" comment="libreoffice-l10n-fi is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100236" version="1" comment="libreoffice-l10n-fr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100237" version="1" comment="libreoffice-l10n-ga is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100238" version="1" comment="libreoffice-l10n-gd is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100239" version="1" comment="libreoffice-l10n-gl is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100240" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100241" version="1" comment="libreoffice-l10n-he is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100242" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100243" version="1" comment="libreoffice-l10n-hr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100244" version="1" comment="libreoffice-l10n-hu is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100245" version="1" comment="libreoffice-l10n-id is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100246" version="1" comment="libreoffice-l10n-is is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100247" version="1" comment="libreoffice-l10n-it is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100248" version="1" comment="libreoffice-l10n-ja is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100249" version="1" comment="libreoffice-l10n-ka is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100250" version="1" comment="libreoffice-l10n-km is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100251" version="1" comment="libreoffice-l10n-kn is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100252" version="1" comment="libreoffice-l10n-ko is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100253" version="1" comment="libreoffice-l10n-lt is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100254" version="1" comment="libreoffice-l10n-mk is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100255" version="1" comment="libreoffice-l10n-ml is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100256" version="1" comment="libreoffice-l10n-mr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100257" version="1" comment="libreoffice-l10n-nb is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100258" version="1" comment="libreoffice-l10n-nl is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100259" version="1" comment="libreoffice-l10n-nn is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100260" version="1" comment="libreoffice-l10n-nr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100261" version="1" comment="libreoffice-l10n-om is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100262" version="1" comment="libreoffice-l10n-or is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100263" version="1" comment="libreoffice-l10n-pa-IN is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100264" version="1" comment="libreoffice-l10n-pl is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100265" version="1" comment="libreoffice-l10n-pt is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100266" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100267" version="1" comment="libreoffice-l10n-ro is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100268" version="1" comment="libreoffice-l10n-ru is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100269" version="1" comment="libreoffice-l10n-rw is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100270" version="1" comment="libreoffice-l10n-sh is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100271" version="1" comment="libreoffice-l10n-sk is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100272" version="1" comment="libreoffice-l10n-sl is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100273" version="1" comment="libreoffice-l10n-sr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100274" version="1" comment="libreoffice-l10n-ss is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100275" version="1" comment="libreoffice-l10n-st is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100276" version="1" comment="libreoffice-l10n-sv is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100277" version="1" comment="libreoffice-l10n-ta is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100278" version="1" comment="libreoffice-l10n-te is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100279" version="1" comment="libreoffice-l10n-tg is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100280" version="1" comment="libreoffice-l10n-th is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100281" version="1" comment="libreoffice-l10n-tr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100282" version="1" comment="libreoffice-l10n-ts is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100283" version="1" comment="libreoffice-l10n-ug is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100284" version="1" comment="libreoffice-l10n-uk is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100285" version="1" comment="libreoffice-l10n-ve is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100286" version="1" comment="libreoffice-l10n-vi is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100287" version="1" comment="libreoffice-l10n-xh is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100288" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100289" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100290" version="1" comment="libreoffice-l10n-zu is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100291" version="1" comment="libreoffice is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100292" version="1" comment="libreoffice-base is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100293" version="1" comment="libreoffice-base-drivers-mysql is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100294" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100295" version="1" comment="libreoffice-base-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100296" version="1" comment="libreoffice-calc is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100297" version="1" comment="libreoffice-calc-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100298" version="1" comment="libreoffice-draw is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100299" version="1" comment="libreoffice-draw-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100300" version="1" comment="libreoffice-filters-optional is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100301" version="1" comment="libreoffice-gnome is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100302" version="1" comment="libreoffice-icon-themes-prebuilt is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100303" version="1" comment="libreoffice-impress is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100304" version="1" comment="libreoffice-impress-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100305" version="1" comment="libreoffice-kde is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100306" version="1" comment="libreoffice-kde4 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100307" version="1" comment="libreoffice-l10n-prebuilt is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100308" version="1" comment="libreoffice-mailmerge is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100309" version="1" comment="libreoffice-math is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100310" version="1" comment="libreoffice-officebean is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100311" version="1" comment="libreoffice-pyuno is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100312" version="1" comment="libreoffice-sdk is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100313" version="1" comment="libreoffice-sdk-doc is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100314" version="1" comment="libreoffice-writer is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100315" version="1" comment="libreoffice-writer-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099944" version="1" comment="MozillaFirefox is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099945" version="1" comment="MozillaFirefox-branding-upstream is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099946" version="1" comment="MozillaFirefox-buildsymbols is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099947" version="1" comment="MozillaFirefox-devel is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099948" version="1" comment="MozillaFirefox-translations-common is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099949" version="1" comment="MozillaFirefox-translations-other is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099950" version="1" comment="libfreebl3 is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099951" version="1" comment="libfreebl3-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099952" version="1" comment="libsoftokn3 is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099953" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099954" version="1" comment="mozilla-nss is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099955" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099956" version="1" comment="mozilla-nss-certs is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099957" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099958" version="1" comment="mozilla-nss-devel is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099959" version="1" comment="mozilla-nss-sysinit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099960" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099961" version="1" comment="mozilla-nss-tools is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100016" version="1" comment="libsnmp30-32bit is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100017" version="1" comment="libsnmp30 is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100018" version="1" comment="net-snmp is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100019" version="1" comment="net-snmp-devel-32bit is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100020" version="1" comment="net-snmp-devel is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100021" version="1" comment="perl-SNMP is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100022" version="1" comment="snmp-mibs is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099962" version="1" comment="MozillaThunderbird is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099963" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099964" version="1" comment="MozillaThunderbird-devel is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099965" version="1" comment="MozillaThunderbird-translations-common is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099966" version="1" comment="MozillaThunderbird-translations-other is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100734" version="1" comment="chromedriver is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100735" version="1" comment="chromium is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100736" version="1" comment="chromium-desktop-gnome is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100737" version="1" comment="chromium-desktop-kde is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100738" version="1" comment="chromium-ffmpegsumo is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100050" version="1" comment="procmail is &lt;3.22-260.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100680" version="1" comment="squid is &lt;3.2.11-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100467" version="1" comment="python-django is &lt;1.4.15-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100468" version="1" comment="ppp is &lt;2.4.5-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100469" version="1" comment="ppp-devel is &lt;2.4.5-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100470" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100471" version="1" comment="php5 is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100472" version="1" comment="php5-bcmath is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100473" version="1" comment="php5-bz2 is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100474" version="1" comment="php5-calendar is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100475" version="1" comment="php5-ctype is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100476" version="1" comment="php5-curl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100477" version="1" comment="php5-dba is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100478" version="1" comment="php5-devel is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100479" version="1" comment="php5-dom is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100480" version="1" comment="php5-enchant is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100481" version="1" comment="php5-exif is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100482" version="1" comment="php5-fastcgi is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100483" version="1" comment="php5-fileinfo is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100484" version="1" comment="php5-fpm is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100485" version="1" comment="php5-ftp is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100486" version="1" comment="php5-gd is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100487" version="1" comment="php5-gettext is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100488" version="1" comment="php5-gmp is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100489" version="1" comment="php5-iconv is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100490" version="1" comment="php5-imap is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100491" version="1" comment="php5-intl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100492" version="1" comment="php5-json is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100493" version="1" comment="php5-ldap is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100494" version="1" comment="php5-mbstring is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100495" version="1" comment="php5-mcrypt is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100496" version="1" comment="php5-mssql is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100497" version="1" comment="php5-mysql is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100498" version="1" comment="php5-odbc is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100499" version="1" comment="php5-openssl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100500" version="1" comment="php5-pcntl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100501" version="1" comment="php5-pdo is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100502" version="1" comment="php5-pear is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100503" version="1" comment="php5-pgsql is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100504" version="1" comment="php5-phar is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100505" version="1" comment="php5-posix is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100506" version="1" comment="php5-pspell is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100507" version="1" comment="php5-readline is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100508" version="1" comment="php5-shmop is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100509" version="1" comment="php5-snmp is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100510" version="1" comment="php5-soap is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100511" version="1" comment="php5-sockets is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100512" version="1" comment="php5-sqlite is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100513" version="1" comment="php5-suhosin is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100514" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100515" version="1" comment="php5-sysvsem is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100516" version="1" comment="php5-sysvshm is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100517" version="1" comment="php5-tidy is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100518" version="1" comment="php5-tokenizer is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100519" version="1" comment="php5-wddx is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100520" version="1" comment="php5-xmlreader is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100521" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100522" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100523" version="1" comment="php5-xsl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100524" version="1" comment="php5-zip is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100525" version="1" comment="php5-zlib is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100587" version="1" comment="curl is &lt;7.28.1-4.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100588" version="1" comment="libcurl-devel is &lt;7.28.1-4.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100589" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100590" version="1" comment="libcurl4 is &lt;7.28.1-4.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100681" version="1" comment="liblua5_2-32bit is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100682" version="1" comment="liblua5_2 is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100683" version="1" comment="lua is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100684" version="1" comment="lua-devel is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100685" version="1" comment="lua-doc is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100739" version="1" comment="phpMyAdmin is &lt;4.1.14.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100740" version="1" comment="dbus-1-x11 is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100741" version="1" comment="dbus-1 is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100742" version="1" comment="dbus-1-32bit is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100743" version="1" comment="dbus-1-devel is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100744" version="1" comment="dbus-1-devel-32bit is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100745" version="1" comment="dbus-1-devel-doc is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100746" version="1" comment="libdbus-1-3 is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100747" version="1" comment="libdbus-1-3-32bit is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100824" version="1" comment="wireshark is &lt;1.10.10-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100825" version="1" comment="wireshark-devel is &lt;1.10.10-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100831" version="1" comment="xen is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100832" version="1" comment="xen-devel is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100833" version="1" comment="xen-kmp-default is &lt;4.2.4_04_k3.7.10_1.40-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100834" version="1" comment="xen-kmp-desktop is &lt;4.2.4_04_k3.7.10_1.40-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100835" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_k3.7.10_1.40-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100836" version="1" comment="xen-libs-32bit is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100837" version="1" comment="xen-libs is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100838" version="1" comment="xen-tools-domU is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100839" version="1" comment="xen-doc-html is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100840" version="1" comment="xen-doc-pdf is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100841" version="1" comment="xen-tools is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100748" version="1" comment="bash is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100749" version="1" comment="bash-devel is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100750" version="1" comment="bash-doc is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100751" version="1" comment="bash-lang is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100752" version="1" comment="bash-loadables is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100753" version="1" comment="libreadline6-32bit is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100754" version="1" comment="libreadline6 is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100755" version="1" comment="readline-devel-32bit is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100756" version="1" comment="readline-devel is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100757" version="1" comment="readline-doc is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100758" version="1" comment="libfreebl3 is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100759" version="1" comment="libfreebl3-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100760" version="1" comment="libsoftokn3 is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100761" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100762" version="1" comment="mozilla-nss is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100763" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100764" version="1" comment="mozilla-nss-certs is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100765" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100766" version="1" comment="mozilla-nss-devel is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100767" version="1" comment="mozilla-nss-sysinit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100768" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100769" version="1" comment="mozilla-nss-tools is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100770" version="1" comment="bash is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100771" version="1" comment="bash-devel is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100772" version="1" comment="bash-doc is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100773" version="1" comment="bash-lang is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100774" version="1" comment="bash-loadables is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100775" version="1" comment="libreadline6-32bit is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100776" version="1" comment="libreadline6 is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100777" version="1" comment="readline-devel-32bit is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100778" version="1" comment="readline-devel is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100779" version="1" comment="readline-doc is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100842" version="1" comment="phpMyAdmin is &lt;4.1.14.5-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100855" version="1" comment="libvirt is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100856" version="1" comment="libvirt-client is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100857" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100858" version="1" comment="libvirt-devel is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100859" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100860" version="1" comment="libvirt-doc is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100861" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100862" version="1" comment="libvirt-python is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100863" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100864" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100865" version="1" comment="python-base is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100866" version="1" comment="python-base-32bit is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100867" version="1" comment="python-devel is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100868" version="1" comment="python-xml is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100869" version="1" comment="python-doc is &lt;2.7-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100870" version="1" comment="python-doc-pdf is &lt;2.7-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100871" version="1" comment="python is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100872" version="1" comment="python-32bit is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100873" version="1" comment="python-curses is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100874" version="1" comment="python-demo is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100875" version="1" comment="python-gdbm is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100876" version="1" comment="python-idle is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100877" version="1" comment="python-tk is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100878" version="1" comment="claws-mail is &lt;3.10.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100879" version="1" comment="claws-mail-devel is &lt;3.10.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100880" version="1" comment="claws-mail-lang is &lt;3.10.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100928" version="1" comment="rsyslog is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100929" version="1" comment="rsyslog-diag-tools is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100930" version="1" comment="rsyslog-doc is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100931" version="1" comment="rsyslog-module-dbi is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100932" version="1" comment="rsyslog-module-elasticsearch is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100933" version="1" comment="rsyslog-module-gssapi is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100934" version="1" comment="rsyslog-module-gtls is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100935" version="1" comment="rsyslog-module-mmnormalize is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100936" version="1" comment="rsyslog-module-mysql is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100937" version="1" comment="rsyslog-module-pgsql is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100938" version="1" comment="rsyslog-module-relp is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100939" version="1" comment="rsyslog-module-snmp is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100940" version="1" comment="rsyslog-module-udpspoof is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101047" version="1" comment="perl-Email-Address is &lt;1.892-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100971" version="1" comment="bash is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100972" version="1" comment="bash-devel is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100973" version="1" comment="bash-doc is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100974" version="1" comment="bash-lang is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100975" version="1" comment="bash-loadables is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100976" version="1" comment="libreadline6-32bit is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100977" version="1" comment="libreadline6 is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100978" version="1" comment="readline-devel-32bit is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100979" version="1" comment="readline-devel is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100980" version="1" comment="readline-doc is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100991" version="1" comment="getmail is &lt;4.46.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100992" version="1" comment="getmail-doc is &lt;4.46.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100993" version="1" comment="wpa_supplicant is &lt;1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100994" version="1" comment="wpa_supplicant-gui is &lt;1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101077" version="1" comment="MozillaFirefox is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101078" version="1" comment="MozillaFirefox-branding-upstream is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101079" version="1" comment="MozillaFirefox-buildsymbols is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101080" version="1" comment="MozillaFirefox-devel is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101081" version="1" comment="MozillaFirefox-translations-common is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101082" version="1" comment="MozillaFirefox-translations-other is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101083" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101084" version="1" comment="mozilla-nspr is &lt;4.10.7-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101085" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101086" version="1" comment="libfreebl3 is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101087" version="1" comment="libfreebl3-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101088" version="1" comment="libsoftokn3 is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101089" version="1" comment="libsoftokn3-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101090" version="1" comment="mozilla-nss is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101091" version="1" comment="mozilla-nss-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101092" version="1" comment="mozilla-nss-certs is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101093" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101094" version="1" comment="mozilla-nss-devel is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101095" version="1" comment="mozilla-nss-sysinit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101096" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101097" version="1" comment="mozilla-nss-tools is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101098" version="1" comment="seamonkey is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101099" version="1" comment="seamonkey-dom-inspector is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101100" version="1" comment="seamonkey-irc is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101101" version="1" comment="seamonkey-translations-common is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101102" version="1" comment="seamonkey-translations-other is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101103" version="1" comment="MozillaThunderbird is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101104" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101105" version="1" comment="MozillaThunderbird-devel is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101106" version="1" comment="MozillaThunderbird-translations-common is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101107" version="1" comment="MozillaThunderbird-translations-other is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101166" version="1" comment="libzmq4 is &lt;4.0.5-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101167" version="1" comment="zeromq is &lt;4.0.5-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101168" version="1" comment="zeromq-devel is &lt;4.0.5-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101049" version="1" comment="libopenssl-devel is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101050" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101051" version="1" comment="libopenssl1_0_0 is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101052" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101053" version="1" comment="openssl is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101054" version="1" comment="openssl-doc is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101055" version="1" comment="libxml2-2 is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101056" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101057" version="1" comment="libxml2 is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101058" version="1" comment="libxml2-devel is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101059" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101060" version="1" comment="libxml2-doc is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101061" version="1" comment="libxml2-tools is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101062" version="1" comment="python-libxml2 is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101139" version="1" comment="phpMyAdmin is &lt;4.1.14.6-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105191" version="1" comment="gnu-efi is &lt;3.0u-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105192" version="1" comment="pesign is &lt;0.109-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105193" version="1" comment="shim is &lt;0.7.318.81ee561d-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101169" version="1" comment="libpurple-branding-openSUSE is &lt;12.2-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101170" version="1" comment="pidgin-branding-openSUSE is &lt;12.2-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101171" version="1" comment="pidgin-otr is &lt;4.0.0-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101172" version="1" comment="finch is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101173" version="1" comment="finch-devel is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101174" version="1" comment="libpurple is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101175" version="1" comment="libpurple-branding-upstream is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101176" version="1" comment="libpurple-devel is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101177" version="1" comment="libpurple-lang is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101178" version="1" comment="libpurple-meanwhile is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101179" version="1" comment="libpurple-tcl is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101180" version="1" comment="pidgin is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101181" version="1" comment="pidgin-devel is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101182" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101183" version="1" comment="php5 is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101184" version="1" comment="php5-bcmath is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101185" version="1" comment="php5-bz2 is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101186" version="1" comment="php5-calendar is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101187" version="1" comment="php5-ctype is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101188" version="1" comment="php5-curl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101189" version="1" comment="php5-dba is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101190" version="1" comment="php5-devel is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101191" version="1" comment="php5-dom is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101192" version="1" comment="php5-enchant is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101193" version="1" comment="php5-exif is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101194" version="1" comment="php5-fastcgi is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101195" version="1" comment="php5-fileinfo is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101196" version="1" comment="php5-fpm is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101197" version="1" comment="php5-ftp is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101198" version="1" comment="php5-gd is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101199" version="1" comment="php5-gettext is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101200" version="1" comment="php5-gmp is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101201" version="1" comment="php5-iconv is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101202" version="1" comment="php5-imap is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101203" version="1" comment="php5-intl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101204" version="1" comment="php5-json is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101205" version="1" comment="php5-ldap is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101206" version="1" comment="php5-mbstring is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101207" version="1" comment="php5-mcrypt is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101208" version="1" comment="php5-mssql is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101209" version="1" comment="php5-mysql is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101210" version="1" comment="php5-odbc is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101211" version="1" comment="php5-openssl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101212" version="1" comment="php5-pcntl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101213" version="1" comment="php5-pdo is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101214" version="1" comment="php5-pear is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101215" version="1" comment="php5-pgsql is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101216" version="1" comment="php5-phar is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101217" version="1" comment="php5-posix is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101218" version="1" comment="php5-pspell is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101219" version="1" comment="php5-readline is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101220" version="1" comment="php5-shmop is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101221" version="1" comment="php5-snmp is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101222" version="1" comment="php5-soap is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101223" version="1" comment="php5-sockets is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101224" version="1" comment="php5-sqlite is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101225" version="1" comment="php5-suhosin is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101226" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101227" version="1" comment="php5-sysvsem is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101228" version="1" comment="php5-sysvshm is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101229" version="1" comment="php5-tidy is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101230" version="1" comment="php5-tokenizer is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101231" version="1" comment="php5-wddx is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101232" version="1" comment="php5-xmlreader is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101233" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101234" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101235" version="1" comment="php5-xsl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101236" version="1" comment="php5-zip is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101237" version="1" comment="php5-zlib is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101334" version="1" comment="libserf-1-0 is &lt;1.1.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101335" version="1" comment="libserf is &lt;1.1.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101336" version="1" comment="libserf-devel is &lt;1.1.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101238" version="1" comment="quassel is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101239" version="1" comment="quassel-base is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101240" version="1" comment="quassel-client is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101241" version="1" comment="quassel-core is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101242" version="1" comment="quassel-mono is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101243" version="1" comment="wget is &lt;1.16-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101337" version="1" comment="ImageMagick is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101338" version="1" comment="ImageMagick-devel-32bit is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101339" version="1" comment="ImageMagick-devel is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101340" version="1" comment="ImageMagick-doc is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101341" version="1" comment="ImageMagick-extra is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101342" version="1" comment="libMagick++-devel is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101343" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101344" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101345" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101346" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101347" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101348" version="1" comment="perl-PerlMagick is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101916" version="1" comment="libvirt is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101917" version="1" comment="libvirt-client is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101918" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101919" version="1" comment="libvirt-devel is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101920" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101921" version="1" comment="libvirt-doc is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101922" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101923" version="1" comment="libvirt-python is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101880" version="1" comment="dbus-1-x11 is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101881" version="1" comment="dbus-1 is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101882" version="1" comment="dbus-1-32bit is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101883" version="1" comment="dbus-1-devel is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101884" version="1" comment="dbus-1-devel-32bit is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101885" version="1" comment="dbus-1-devel-doc is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101886" version="1" comment="libdbus-1-3 is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101887" version="1" comment="libdbus-1-3-32bit is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102017" version="1" comment="libopenssl-devel is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102018" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102019" version="1" comment="libopenssl1_0_0 is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102020" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102021" version="1" comment="openssl is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102022" version="1" comment="openssl-doc is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101924" version="1" comment="gnutls is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101925" version="1" comment="libgnutls-devel is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101926" version="1" comment="libgnutls-devel-32bit is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101927" version="1" comment="libgnutls-openssl-devel is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101928" version="1" comment="libgnutls-openssl27 is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101929" version="1" comment="libgnutls28 is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101930" version="1" comment="libgnutls28-32bit is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101931" version="1" comment="libgnutlsxx-devel is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101932" version="1" comment="libgnutlsxx28 is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102080" version="1" comment="rubygem-sprockets-2_2 is &lt;2.2.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102081" version="1" comment="rubygem-sprockets-2_2-doc is &lt;2.2.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102082" version="1" comment="rubygem-sprockets-2_1 is &lt;2.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102083" version="1" comment="rubygem-sprockets-2_1-doc is &lt;2.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102084" version="1" comment="wireshark is &lt;1.10.11-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102085" version="1" comment="wireshark-devel is &lt;1.10.11-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102037" version="1" comment="ImageMagick is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102038" version="1" comment="ImageMagick-devel-32bit is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102039" version="1" comment="ImageMagick-devel is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102040" version="1" comment="ImageMagick-doc is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102041" version="1" comment="ImageMagick-extra is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102042" version="1" comment="libMagick++-devel is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102043" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102044" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102045" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102046" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102047" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102048" version="1" comment="perl-PerlMagick is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102100" version="1" comment="rubygem-sprockets is &lt;2.8.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102101" version="1" comment="rubygem-sprockets-doc is &lt;2.8.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102102" version="1" comment="file is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102103" version="1" comment="file-devel is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102104" version="1" comment="libmagic-data is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102105" version="1" comment="libmagic1-32bit is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102106" version="1" comment="libmagic1 is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102107" version="1" comment="python-magic is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102494" version="1" comment="clamav is &lt;0.98.5-5.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102108" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102109" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102495" version="1" comment="phpMyAdmin is &lt;4.1.14.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102571" version="1" comment="apache2-mod_wsgi is &lt;3.3-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102572" version="1" comment="icecast is &lt;2.3.2-72.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102573" version="1" comment="flac is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102574" version="1" comment="flac-devel is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102575" version="1" comment="flac-devel-32bit is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102576" version="1" comment="libFLAC++6 is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102577" version="1" comment="libFLAC++6-32bit is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102578" version="1" comment="libFLAC8 is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102579" version="1" comment="libFLAC8-32bit is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102580" version="1" comment="ruby19 is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102581" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102582" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102583" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102584" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102585" version="1" comment="openvpn is &lt;2.2.2-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102586" version="1" comment="openvpn-auth-pam-plugin is &lt;2.2.2-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102587" version="1" comment="openvpn-down-root-plugin is &lt;2.2.2-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102728" version="1" comment="apache2 is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102729" version="1" comment="apache2-devel is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102730" version="1" comment="apache2-doc is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102731" version="1" comment="apache2-event is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102732" version="1" comment="apache2-example-pages is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102733" version="1" comment="apache2-itk is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102734" version="1" comment="apache2-prefork is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102735" version="1" comment="apache2-utils is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102736" version="1" comment="apache2-worker is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102737" version="1" comment="cpio is &lt;2.11-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102738" version="1" comment="cpio-lang is &lt;2.11-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102700" version="1" comment="libyaml-0-2 is &lt;0.1.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102701" version="1" comment="libyaml is &lt;0.1.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102702" version="1" comment="libyaml-devel is &lt;0.1.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102739" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102740" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102741" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102742" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102743" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102744" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102745" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102508" version="1" comment="MozillaFirefox is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102509" version="1" comment="MozillaFirefox-branding-upstream is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102510" version="1" comment="MozillaFirefox-buildsymbols is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102511" version="1" comment="MozillaFirefox-devel is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102512" version="1" comment="MozillaFirefox-translations-common is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102513" version="1" comment="MozillaFirefox-translations-other is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102514" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102515" version="1" comment="mozilla-nspr is &lt;4.10.7-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102516" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102517" version="1" comment="libfreebl3 is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102518" version="1" comment="libfreebl3-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102519" version="1" comment="libsoftokn3 is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102520" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102521" version="1" comment="mozilla-nss is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102522" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102523" version="1" comment="mozilla-nss-certs is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102524" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102525" version="1" comment="mozilla-nss-devel is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102526" version="1" comment="mozilla-nss-sysinit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102527" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102528" version="1" comment="mozilla-nss-tools is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102901" version="1" comment="MozillaThunderbird is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102902" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102903" version="1" comment="MozillaThunderbird-devel is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102904" version="1" comment="MozillaThunderbird-translations-common is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102905" version="1" comment="MozillaThunderbird-translations-other is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102746" version="1" comment="libjpeg-turbo is &lt;1.2.1-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102747" version="1" comment="libjpeg8-32bit is &lt;8.0.2-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102748" version="1" comment="libjpeg8 is &lt;8.0.2-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102749" version="1" comment="libjpeg8-devel-32bit is &lt;8.0.2-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102750" version="1" comment="libjpeg8-devel is &lt;8.0.2-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102751" version="1" comment="libjpeg62-32bit is &lt;62.0.0-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102752" version="1" comment="libjpeg62 is &lt;62.0.0-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102753" version="1" comment="libjpeg62-devel-32bit is &lt;62.0.0-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102754" version="1" comment="libjpeg62-devel is &lt;62.0.0-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102755" version="1" comment="libjpeg62-turbo is &lt;1.2.1-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102756" version="1" comment="phpMyAdmin is &lt;4.1.14.8-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102757" version="1" comment="lua-rrdtool is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102758" version="1" comment="python-rrdtool is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102759" version="1" comment="rrdtool is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102760" version="1" comment="rrdtool-devel is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102761" version="1" comment="tcl-rrdtool is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102762" version="1" comment="mutt is &lt;1.5.21-36.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102763" version="1" comment="firebird-classic is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102764" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102765" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102766" version="1" comment="firebird is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102767" version="1" comment="firebird-32bit is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102768" version="1" comment="firebird-devel is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102769" version="1" comment="firebird-doc is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102770" version="1" comment="firebird-superserver is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102771" version="1" comment="libfbclient2 is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102772" version="1" comment="libfbclient2-32bit is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102773" version="1" comment="libfbclient2-devel is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102774" version="1" comment="jasper is &lt;1.900.1-156.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102775" version="1" comment="libjasper-devel is &lt;1.900.1-156.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102776" version="1" comment="libjasper1 is &lt;1.900.1-156.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102777" version="1" comment="libjasper1-32bit is &lt;1.900.1-156.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102906" version="1" comment="seamonkey is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102907" version="1" comment="seamonkey-dom-inspector is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102908" version="1" comment="seamonkey-irc is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102909" version="1" comment="seamonkey-translations-common is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102910" version="1" comment="seamonkey-translations-other is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103109" version="1" comment="pdns-recursor is &lt;3.6.2-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103110" version="1" comment="libksba is &lt;1.3.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103111" version="1" comment="libksba-devel is &lt;1.3.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103112" version="1" comment="libksba8 is &lt;1.3.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103200" version="1" comment="mailx is &lt;12.5-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102941" version="1" comment="kernel-debug is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102942" version="1" comment="kernel-debug-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102943" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102944" version="1" comment="kernel-default is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102945" version="1" comment="kernel-default-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102946" version="1" comment="kernel-default-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102947" version="1" comment="kernel-desktop is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102948" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102949" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102950" version="1" comment="kernel-docs is &lt;3.7.10-1.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102951" version="1" comment="kernel-ec2 is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102952" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102953" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102954" version="1" comment="kernel-pae is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102955" version="1" comment="kernel-pae-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102956" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102957" version="1" comment="kernel-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102958" version="1" comment="kernel-source is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102959" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102960" version="1" comment="kernel-syms is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102961" version="1" comment="kernel-trace is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102962" version="1" comment="kernel-trace-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102963" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102964" version="1" comment="kernel-vanilla is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102965" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102966" version="1" comment="kernel-xen is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102967" version="1" comment="kernel-xen-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102968" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103201" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103202" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103203" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103204" version="1" comment="python3-rpm is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103205" version="1" comment="rpm-python is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103206" version="1" comment="rpm-32bit is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103207" version="1" comment="rpm is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103208" version="1" comment="rpm-build is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103209" version="1" comment="rpm-devel is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103245" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103246" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103247" version="1" comment="subversion is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103248" version="1" comment="subversion-bash-completion is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103249" version="1" comment="subversion-devel is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103250" version="1" comment="subversion-perl is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103251" version="1" comment="subversion-python is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103252" version="1" comment="subversion-server is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103253" version="1" comment="subversion-tools is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102969" version="1" comment="ntp is &lt;4.2.6p5-9.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102970" version="1" comment="ntp-doc is &lt;4.2.6p5-9.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103254" version="1" comment="apache2 is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103255" version="1" comment="apache2-devel is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103256" version="1" comment="apache2-doc is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103257" version="1" comment="apache2-event is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103258" version="1" comment="apache2-example-pages is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103259" version="1" comment="apache2-itk is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103260" version="1" comment="apache2-prefork is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103261" version="1" comment="apache2-utils is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103262" version="1" comment="apache2-worker is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105046" version="1" comment="libssh is &lt;0.5.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105047" version="1" comment="libssh-devel is &lt;0.5.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105048" version="1" comment="libssh-devel-doc is &lt;0.5.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105049" version="1" comment="libssh4 is &lt;0.5.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105095" version="1" comment="jasper is &lt;1.900.1-156.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105096" version="1" comment="libjasper-devel is &lt;1.900.1-156.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105097" version="1" comment="libjasper1 is &lt;1.900.1-156.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105098" version="1" comment="libjasper1-32bit is &lt;1.900.1-156.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105683" version="1" comment="glibc-testsuite is &lt;2.17-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105684" version="1" comment="glibc-utils is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105685" version="1" comment="glibc-utils-32bit is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105686" version="1" comment="glibc is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105687" version="1" comment="glibc-devel is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105688" version="1" comment="glibc-devel-static is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105689" version="1" comment="glibc-extra is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105690" version="1" comment="glibc-html is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105691" version="1" comment="glibc-i18ndata is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105692" version="1" comment="glibc-info is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105693" version="1" comment="glibc-locale is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105694" version="1" comment="glibc-obsolete is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105695" version="1" comment="glibc-profile is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105696" version="1" comment="nscd is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-superserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitPlugin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-novncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-objectstore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-vncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-quantum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-quantum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-quantum-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-quantum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-quickstart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-account</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-object</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinderclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinderclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinderclient-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-django_openstack_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pam-ldapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pam-ldapd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble-xmpp-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>almanah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>almanah-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lwresd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-itk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r300-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_softpipe-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_softpipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_softpipe-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_softpipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libautotrace3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>darktable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>darktable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-greenlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-greenlet-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www-dch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-ffmpegsumo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-suid-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Signature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagstamon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-liboxygenstyle-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-liboxygenstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-plasma-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-kdebase4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>srtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>srtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-itsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-debug-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-debug-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glanceclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glanceclient-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filezilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filezilla-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>putty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_3m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_3m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_chrono1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_timer1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-analyze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-analyze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUdev-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclutter-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclutter-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Clutter-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SpiceClientGtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zenmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dropbear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_fcgid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvarnishapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodules-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodules-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-svg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>horde5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates-mozilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd-dedicated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libv8-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webyast-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webyast-base-branding-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webyast-base-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-downtimes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-eventhandlers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gtk-greeter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gtk-greeter-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gtk-greeter-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bot-sentry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-bot-sentry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-bot-sentry-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-advanced-sound-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-advanced-sound-notification-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-advanced-sound-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-birthday-reminder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-birthday-reminder-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-birthday-reminder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-embeddedvideo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-embeddedvideo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-facebookchat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-facebookchat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-guifications</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-guifications-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-guifications</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-mrim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-mrim-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-mrim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-openfetion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-openfetion-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-openfetion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-sipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-sipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-plugin-sipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-pack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-pack-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-pack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-pack-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>purple-plugin-pack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>purple-plugin-pack-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-skype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-skype-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-skype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skype4pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-haze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear-Net_IDNA2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>percona-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-UDisks-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Body</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-ssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>couchdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-spine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nrpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-eyeD3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>android-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfixadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-capng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ninja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uucp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-xsltc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eet-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eet-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eet-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeet1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jbigkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IPython-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-IPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-crystal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-hicontrast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-oxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be-BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-loadables</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Email-Address</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>getmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>getmail-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcl-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6p3-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.0.2-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4-1.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.7-4.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.1-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.16.2-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.7-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1362502414.95a620b-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1362503968.8ece3c7-2.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363297737.dd849a9-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1362502288.8690166-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363297910.9561484-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1362583635.f94b149-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2+git.1360262230.cb0fbe8-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4.1+git.1359529903.0ce3e1d-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4-61.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.4-61.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.25-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.18-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.10-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.10-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.21-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.17-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.7-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363796849.255b1d4-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3-15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.2P2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5.P1-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.22-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.0-1.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5-61.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.5-61.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5-1.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.2.4-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.9-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-1.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.2-34.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.0-34.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-34.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.14-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.08-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.8-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363796849.255b1d4-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-59.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.0-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6-61.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.6-61.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.10-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31.1-637.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8.1-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.7-3.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.7-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363297910.9561484-2.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363297910.9561484-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4.1+git.1359529903.0ce3e1d-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363796849.255b1d4-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-14.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.0-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.7-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:30.0.1553.0-1.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.73-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.2-34.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.0-34.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-34.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.5-1.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.11-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.35-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.9-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.22-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.18-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.32-1.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.15.0-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:23.0-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8-61.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2+17.0.8-61.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.3P2-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.3-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.63-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8b-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_k3.7.10_1.16-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.13-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0-61.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2+24.0-61.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.21-1.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.49.0-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:195-13.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:30.0.1599.66-1.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4d-4.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.25-3.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-114.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.60-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.11-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_01-1.22.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_01_k3.7.10_1.16-1.22.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0-1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.1.0-61.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.1.0-61.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10-1.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-9.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-1.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.11-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0.1650.57-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-1.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.36.4-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.14-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.12-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25b-195.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0.1650.63-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:26.0-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.2.0-61.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.2.0-61.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.31-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.23-1.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.24.8-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.43.1-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.4-3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.4-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.08-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.0-2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.11-2.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.32.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3.25-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.1-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.69-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.28-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-4.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1.rev624-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:27.0-1.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3.0-61.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.3.0-61.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.4-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-1.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:32.0.1700.102-1.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-21.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.16-2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.58.0-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:33.0.1750.117-1.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-1.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_k3.7.10_1.28-1.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.8-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.2.7-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.12-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.28-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.5-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.20-26.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-26.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.11-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.13-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-36.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11-12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.35-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:28.0-1.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.4-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.5-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:33.0.1750.152-1.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.4.0-61.43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.4.0-61.43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-1.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-1353.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-163.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-114.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.21-26.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-26.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-13.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-1.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:34.0.1847.116-1.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8b-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8b-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-1.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.13-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:29.0-1.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.5.0-61.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.5.0-61.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-1.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.18-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1_r1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-1.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:34.0.1847.132-1.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.03-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-21.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4.22-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.6-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:35.0.1916.114-1.45.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0+git.20130603.0f53fd3-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.28-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1h-1.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-85.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.5-85.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.07-85.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.34-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:30.0-1.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.6-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0-61.51.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.6.0-61.51.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.5-317.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-1.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-259.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.06-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-1.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.3-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.7.0-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.83-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:36.0.1985.125-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.155-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4.23-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.22-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.18-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.3-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3.2.4-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3.2.4-2.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.1.0-1.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-1.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.1.0-61.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:37.0.2062.94-1.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-260.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.15-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.24-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-1.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_k3.7.10_1.40-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-61.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-61.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-1.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-61.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-61.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.5-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.7-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.892-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-61.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-61.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.46.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:33.0-1.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.1-1.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0-61.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-2.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1j-1.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.6-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0u-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.109-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.10-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.26-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1j-1.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.28-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.11-1.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-5.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.7-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-72.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1_git201212051942-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.29-10.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-21.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.55-8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:34.0.5-1.94.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-1.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0-61.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-19.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-19.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.0.0-19.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.8-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-36.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-156.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-1.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.19-2.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.29-10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-156.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.17.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
